Prosecuting Ip Crimes Manual 2013
prosecuting_ip_crimes_manual_2013
prosecuting_ip_crimes_manual_2013
User Manual:
Open the PDF directly: View PDF .
Page Count: 509
Download | |
Open PDF In Browser | View PDF |
Prosecuting Intellectual Property Crimes H. Marshall Jarrett Director, EOUSA Fourth Edition Cameron G. Chandler Director, OLE OLE Litigation Series Ed Hagen Assistant Director, OLE Andrea Sharrin Deputy Chief for Intellectual Property CCIPS Criminal Division Published by Office of Legal Education Executive Office for United States Attorneys The contents of this book provide internal suggestions to Department of Justice attorneys. Nothing in it is intended to create any substantive or procedural rights, privileges, or benefits enforceable in any administrative, civil, or criminal matter by any prospective or actual witnesses or parties. See United States v. Caceres, 440 U.S. 741 (1979). Table of Contents Preface and Acknowledgements....................................................................xi I. Intellectual Property—An Introduction............................................. 1 A. Why Is Intellectual Property Enforcement Important?.................................. 1 B. What Is Intellectual Property?.............................................................................. 6 1. Copyright........................................................................................................... 6 2. Trademarks and Service Marks..................................................................... 6 3. Patents................................................................................................................. 7 4. Trade Secrets...................................................................................................... 8 II. Criminal Copyright Infringement— 17 U.S.C. § 506 and 18 U.S.C. § 2319.................................................. 9 A. Overview................................................................................................................. 10 1. What Copyright Law Protects.................................................................... 10 2. Legal Basis for Copyright and Related Laws........................................... 11 3. Relevance of Civil Cases to Criminal Prosecutions................................ 11 4. Federal Preemption........................................................................................ 12 5. When Copyright Protection Begins and Ends........................................ 13 6. The Rights Protected by Copyright........................................................... 14 7. When Infringement Is Criminal................................................................. 15 B. Elements.................................................................................................................. 16 1. Existence of a Copyright.............................................................................. 18 2. The Defendant Acted “Willfully”............................................................... 26 3. Infringement of the Copyright................................................................... 33 4. Additional Element for Enhanced Sentence: Purpose of Commercial Advantage or Private Financial Gain................................. 55 5. Misdemeanor Copyright Infringement..................................................... 59 C. Defenses................................................................................................................... 60 1. Statute of Limitations: 5 years..................................................................... 60 2. Jurisdiction....................................................................................................... 61 3. Venue................................................................................................................. 63 4. The First Sale Doctrine—17 U.S.C. § 109.............................................. 63 5. Fair Use............................................................................................................. 69 6. “Archival Exception” for Computer Software—17 U.S.C. § 117...... 74 iii D. Emerging and Special Issues............................................................................... 76 1. Internet Streaming......................................................................................... 76 2. Cyberlockers and Linking Sites................................................................... 78 E. Penalties................................................................................................................... 80 1. Statutory Penalties.......................................................................................... 80 2. Sentencing Guidelines................................................................................... 80 F. Other Charges to Consider................................................................................. 81 III. Trafficking In Counterfeit Trademarks, Service Marks, and Certification Marks—18 U.S.C. § 2320.................................. 89 A. Introduction........................................................................................................... 89 1. Overview.......................................................................................................... 89 2. Why Criminal Law Protects Trademarks, Service Marks, and Certification Marks................................................................................ 92 B. Elements.................................................................................................................. 94 1. The Trademark Counterfeiting Crime in General.................................. 94 2. Relevance of Civil Trademark Law in Criminal Counterfeiting Cases..................................................................................... 96 3. Intentionally Trafficked in Goods or Services (or Labels, Documentation, or Packaging for Goods or Services).......................... 97 4. The Defendant Used a “Counterfeit Mark”: Definition of a Counterfeit Mark............................................................104 5. The Defendant Used the Counterfeit Mark “Knowingly”.................121 6. Trafficking in Counterfeit Military Goods or Services........................126 7. Trafficking in Counterfeit Drugs..............................................................128 8. Venue...............................................................................................................129 C. Defenses.................................................................................................................130 1. Authorized-Use Defense: Overrun Goods.............................................130 2. Authorized-Use Defense: Gray Market Goods.....................................133 3. Repackaging Genuine Goods....................................................................134 4. Lanham Act Defenses..................................................................................137 5. Statute of Limitations..................................................................................138 6. Vagueness Challenges..................................................................................139 D. Special Issues.........................................................................................................140 1. High-Quality and Low-Quality Counterfeits.......................................140 2. Counterfeit Goods with Genuine Trademarks......................................141 3. Selling Fakes While Admitting That They Are Fakes..........................141 iv 4. Selling Another’s Trademarked Goods As One’s Own (Reverse Passing-Off)...................................................................................141 5. Mark-Holder’s Failure to Use Symbol.................................................142 6. Storage Costs and Destruction..................................................................142 7. Units of Prosecution....................................................................................143 8. Olympic Symbols.........................................................................................145 E. Penalties.................................................................................................................146 1. Fines and Imprisonment............................................................................146 2. Restitution.....................................................................................................146 3. Forfeiture........................................................................................................149 4. Sentencing Guidelines.................................................................................149 F. Other Charges to Consider...............................................................................151 ® IV. Theft of Commercial Trade Secrets— 18 U.S.C. §§ 1831-1839........................................................................... 155 A. Introduction.........................................................................................................155 B. The Economic Espionage Act of 1996, 18 U.S.C. §§ 1831-1839..........157 1. Overview........................................................................................................157 2. Relevance of Civil Cases.............................................................................161 3. Elements Common to 18 U.S.C. §§ 1831, 1832................................162 4. Additional 18 U.S.C. § 1831 Element: Intent to Benefit a Foreign Government, Foreign Instrumentality, or Foreign Agent...................182 5. Additional 18 U.S.C. § 1832 Elements..................................................185 6. Attempts and Conspiracies, Including the Impossibility Defense...........................................................................189 C. Defenses.................................................................................................................191 1. Common Defenses......................................................................................191 2. Parallel Development..................................................................................198 3. Reverse Engineering....................................................................................199 4. Legal Impossibility.......................................................................................200 5. Advice of Counsel........................................................................................200 6. Claim of Right—Public Domain and Proprietary Rights..................201 7. The First Amendment.................................................................................202 8. Void-for-Vagueness......................................................................................203 D. Preserving Confidentiality and the Use of Protective Orders...................205 1. Overview........................................................................................................205 2. Interlocutory Appeals..................................................................................207 3. Types of Protective Orders.........................................................................210 v 4. Return of Trade Secrets Upon Conclusion of the Case.......................214 E. Special Issues.........................................................................................................214 1. Civil Injunctive Relief for the United States..........................................214 2. Parallel Proceedings......................................................................................215 3. Significance of Electronic Evidence in Trade Secret and Economic Espionage Act Cases........................................................219 4. Extraterritoriality..........................................................................................221 5. Department of Justice Oversight..............................................................221 F. Penalties.................................................................................................................222 1. Statutory Penalties........................................................................................222 2. Sentencing Guidelines.................................................................................224 G. Other Charges to Consider...............................................................................224 V. Digital Millennium Copyright Act— 17 U.S.C. §§ 1201-1205........................................................................... 233 A. Introduction.........................................................................................................233 1. DMCA’s Background and Purpose..........................................................233 2. Key Concepts: Access Controls vs. Copy Controls, Circumvention vs. Trafficking...................................................................234 3. Differences Between the DMCA and Traditional Copyright Law...238 4. Other DMCA Sections That Do Not Concern Prosecutors..............240 B. Elements of the Anti-Circumvention and Anti-Trafficking Provisions................................................................................241 1. Circumventing Access Controls—17 U.S.C. §§ 1201(a)(1) and 1204........................................................................................................241 2. Trafficking in Access Control Circumvention Tools and Services—17 U.S.C. §§ 1201(a)(2) and 1204..............................253 3. Trafficking in Tools, Devices, and Services to Circumvent Copy Controls—17 U.S.C. §§ 1201(b)(1) and 1204........................258 4. Alternate § 1201(b) Action—Trafficking in Certain Analog Videocassette Recorders and Camcorders................................262 5. Falsifying, Altering, or Removing Copyright Management Information—17 U.S.C. § 1202.............................................................262 C. Defenses.................................................................................................................263 1. Statute of Limitations..................................................................................263 2. Librarian of Congress Regulations...........................................................263 3. Certain Nonprofit Entities.........................................................................264 4. Information Security Exemption..............................................................264 vi 5. Reverse Engineering and Interoperability of Computer Programs...............................................................................264 6. Encryption Research....................................................................................267 7. Restricting Minors’ Access to the Internet.............................................269 8. Protection of Personally Identifying Information................................269 9. Security Testing.............................................................................................270 10. Constitutionality of the DMCA...............................................................270 D. Penalties.................................................................................................................279 VI. Counterfeit and Illicit Labels, Counterfeit Documentation and Packaging—18 U.S.C. § 2318................ 281 A. Distinguished from Trademark and Copyright Statutes............................281 B. Elements................................................................................................................282 1. The Defendant Acted “Knowingly”.........................................................283 2. The Defendant Trafficked...........................................................................284 3. Trafficking in Labels Affixed to, Enclosing, or Accompanying (or Designed to be Affixed to, Enclose, or Accompany) a Phonorecord, Computer Program, Motion Picture or Other Audiovisual Work, Literary, Pictorial, Graphic, or Sculptural Work, or Work of Visual Art, or Trafficking in Documentation or Packaging for Such Works.................................285 4. The Labels, Documentation, or Packaging Materials Are Counterfeit or Illicit.............................................................................286 5. Federal Jurisdiction......................................................................................288 6. Venue...............................................................................................................290 C. Defenses.................................................................................................................290 1. Statute of Limitations..................................................................................290 2. First Sale (Does Not Apply).......................................................................290 D. Special Issues.........................................................................................................290 1. Electronic Copies of Labels, Documentation, or Packaging.............290 2. Advantages of Charging a § 2318 Offense.............................................291 E. Penalties.................................................................................................................292 1. Fines................................................................................................................292 2. Imprisonment...............................................................................................292 3. Restitution.....................................................................................................292 4. Forfeiture........................................................................................................293 5. Sentencing Guidelines.................................................................................293 F. Other Charges to Consider...............................................................................295 vii VII. Patent................................................................................................................ 297 A. B. C. D. Overview of Patent..............................................................................................297 Forgery of Letters Patent—18 U.S.C. § 497................................................298 False Marking of Patent—35 U.S.C. § 292..................................................299 No Prosecution for Interstate Transportation or Receipt of Stolen Property—18 U.S.C. §§ 2314, 2315...........................................304 VIII.Penalties, Restitution, and Forfeiture............................................ 305 A. Introduction.........................................................................................................305 B. The Statutory Sentencing Factors....................................................................306 C. Sentencing Guidelines........................................................................................310 1. Offenses Involving Copyright (Including Bootleg Music, Camcorded Movies, and the Unauthorized Use of Satellite, Radio, and Cable Communications), Trademark, Counterfeit Labeling, and the DMCA...................................................311 2. Offenses Involving the Economic Espionage Act (EEA)....................331 D. Restitution.............................................................................................................343 1. Restitution is Available—and Often Required— in Intellectual Property Prosecutions.......................................................343 2. Identifying Victims Who Qualify for Restitution................................348 3. Determining a Restitution Figure............................................................352 E. Forfeiture...............................................................................................................357 1. Property Subject to Forfeiture...................................................................360 2. Overview of Forfeiture Procedures...........................................................360 3. Choosing a Forfeiture Procedure..............................................................368 4. Civil Forfeiture in Intellectual Property Matters..................................369 5. Criminal Forfeiture in IP Matters............................................................370 6. Domain Name Forfeiture...........................................................................372 7. Interbank Account Seizures of Foreign Bank Funds............................375 IX. Charging Decisions.................................................................................. 377 A. Introduction.........................................................................................................377 B. The Federal Interest in Intellectual Property Crimes..................................378 1. Federal Law Enforcement Priorities.........................................................378 2. The Nature and Seriousness of the Offense...........................................379 3. The Deterrent Effect of Prosecution........................................................381 4. The Individual’s History of Criminal Offenses and Civil Intellectual Property Violations......................................................381 viii 5. The Individual’s Willingness to Cooperate in the Investigation or Prosecution of Others.......................................382 C. Whether the Person Is Subject to Prosecution in Another Jurisdiction......................................................................................382 D. The Adequacy of Alternative Non-Criminal Remedies..............................384 E. Special Considerations in Deciding Whether to Charge Corporations and Other Business Organizations....................385 X. Victims of Intellectual Property Crimes— Ethics and Obligations............................................................................. 387 A. Victims’ Rights.....................................................................................................387 B. The Victim’s Role in the Criminal Prosecution............................................390 1. Reporting an Intellectual Property Crime..............................................390 2. Ethical Concerns When the Criminal Prosecution Results in an Advantage in a Civil Matter............................................................390 3. Parallel Civil Suits........................................................................................393 C. Offers of Assistance From Victims and Related Parties..............................397 1. Gift Issues.......................................................................................................398 2. Professional Responsibility Issues.............................................................408 3. Strategic and Case-Related Issues.............................................................409 4. Help and Advice...........................................................................................412 Appendices A. Commonly Charged Intellectual Property Crimes.....................................413 B-F. Sample Indictments and Jury Instructions..................................................437 G. Intellectual Property Contact List...................................................................439 H. Checklist for Reporting an Intellectual Property Crime............................453 I. Pre-PRO-IP Act Forfeiture Statutes for IP Offenses...................................465 J. Examples of Traditional Assistance and Gifts to Law Enforcement........473 Index.......................................................................................................................... 481 ix x Preface and Acknowledgements This publication is the fourth edition of the “Prosecuting Intellectual Property Crimes” Manual and provides significant updates to the comprehensive 2006 edition. It examines in depth all areas of prosecuting intellectual property crimes and incorporates a number of recent changes to the case law, statutes, and sentencing guidelines. Throughout, the material is presented in a way that is intended to provide the most practical use to prosecutors. This publication is the result of a tremendous amount of work by many individuals in the Computer Crime and Intellectual Property Section. Kendra Ervin assumed primary responsibilities as Managing Editor as well as providing substantive updates to chapters. Many other CCIPS attorneys made significant contributions as well, including in alphabetical order: Thomas Dougherty, Scott Eltringham, Jason Gull, Eric Klumb, Brian Levine, Evan Williams and John Zacharia. Former CCIPS attorneys whose efforts also contributed include Matthew Bassiur, Mark Krotoski, Tyler Newby and Tara Swaminatha. CCIPS supervisory paralegal specialist Kathleen Baker deserves special mention for her superior editing and proofing contributions. Other paralegals and summer interns who contributed to this publication over the past few years include: Allyson Bennett, Jarrell Cook, Glenn Gordon, Lily Hines, Michael McCluskey, and John Sprangers. Finally, we are grateful to Ed Hagen and others at the Office of Legal Education for putting this Manual into final form worthy of publication. This Manual is intended as assistance, not authority. The research, analysis, and conclusions herein reflect current thinking on difficult areas of the law; they do not represent the official position of the Department of Justice or any other agency. This Manual has no regulatory effect, confers no rights or remedies, and does not have the force of law or a U.S. Department of Justice directive. See United States v. Caceres, 440 U.S. 741 (1979). If you have questions about anything in this book, we invite you to call the Computer Crime and Intellectual Property Section at (202) 514-1026. xi Attorneys are on duty every day for the specific purpose of answering such calls and providing support to U.S. Attorney’s Offices nationwide. Andrea M. Sharrin, Deputy Chief Computer Crime & Intellectual Property Section Criminal Division Department of Justice xii I. Intellectual Property— An Introduction A. Why Is Intellectual Property Enforcement Important? Intellectual property (IP), including creative works protected by copyright, brand identification protected by trademark, and novel inventions protected by patents and trade secret law, encompasses a vital component of the U.S. economy and, increasingly, the world’s collective wealth. American music, motion pictures, business and entertainment software, as well as American brands, form an important part of America’s cultural identity. The U.S. is also home to some of the world’s largest manufacturers and most innovative companies, whose sought-after products are exported throughout the world. According to the Department of Commerce, in 2010 “IP-intensive industries”— those most reliant on copyright, trademark and patent protection—accounted for more than 27 million or more than one sixth of all jobs in the U.S., and more than one third of the U.S. gross domestic product. Department of Commerce, Intellectual Property and the U.S. Economy: Industries in Focus at vi-vii (March 2012), available at http://www.esa.doc.gov/sites/default/files/ reports/documents/ipandtheuseconomyindustriesinfocus.pdf. Effective IP enforcement can help to preserve and create jobs and economic growth by fostering a level playing field for fair competition in the global marketplace. Protecting IP rights is essential to fostering the innovation and creativity which fuels the U.S. economic engine. IP rights create incentives for entrepreneurs, artists, firms, and investors to commit the necessary resources to research, develop, and market new technologies and creative works. As one court observed, “[t]he future of the nation depends in no small part on the efficiency of industry, and the efficiency of industry depends in no small part on the protection of intellectual property.” Rockwell Graphic Sys., Inc. v. DEV Indus., Inc., 925 F.2d 174, 180 (7th Cir. 1991). 1 The criminal enforcement of IP rights plays a critical role in safeguarding U.S. economic and national security interests as well as protecting the health and safety of consumers worldwide. The impact of today’s IP crime is not limited to the economic challenges associated with piracy, counterfeiting, or trade secret theft. Inferior, unsafe counterfeits, ranging from electrical equipment to auto parts to pharmaceuticals, not only defraud ordinary consumers, but also can pose significant risks to their health and safety. The potential harm from counterfeit goods is further compounded when those goods enter the government or military supply chain, where they can impact the safety of our Armed Forces, and even compromise national security. Likewise, our national security interests can be undermined by foreign and domestic competitors who deliberately target leading U.S. industries and technologies to obtain sensitive trade secrets that have applications in defense, security, or critical infrastructure. This is a dynamic time for IP enforcement. New technology and more sophisticated methods of manufacturing and distribution have created unprecedented opportunities for legitimate businesses, both large and small, to develop their products and market and distribute them around the world. Manufacturers and consumers are increasingly interconnected due to advances in telecommunication networks, integrated financial markets, and global advertising. Consumers enjoy near-immediate access to almost any product manufactured in the U.S. or abroad. They can provide instant payment through an international credit card system or online payment processors and receive their purchase either through immediate downloading of digital content or overnight shipment of tangible goods through express courier services. Companies and their employees also can conduct business seamlessly from anywhere in the world. Virtually all business records, research, and sensitive information exists in digital form and can be stored, accessed, copied, and transmitted using computer networks, cloud storage, and large capacity mobile devices. Unfortunately, IP criminals exploit the benefits of these advances to support illegal piracy and counterfeiting operations. U.S. companies suffer substantial losses from international trade in counterfeit and pirated goods, which the OECD has estimated to amount to hundreds of billions of dollars each year. See Organization for Economic Cooperation and Development, Magnitude of Counterfeiting and Piracy of Tangible Products: An Update (November 2009); Frontier Economics, Estimating the Global Economic and Social Impacts of Counterfeiting and Piracy (February 2011) (suggesting the value of counterfeit 2 Prosecuting Intellectual Property Crimes and pirated products for G20 nations was $650 billion in 2008 and likely to more than double by 2015). Although quantifying the economic effects of counterfeit and pirated goods with precision is difficult, the problem is undeniably sizable with substantial consequences: to industry in the form of lost sales, lost brand value, and reduced incentives to innovate; to consumers who use or ingest substandard or unsafe counterfeit goods; to governments which may lose tax revenue and face risks of counterfeits entering national security or critical infrastructure supply chains; and to economic growth slowed by reduced innovation and lost trade revenue. See U.S. Government Accountability Office, Intellectual Property: Observations on Efforts to Quantify the Economic Effects of Counterfeit and Pirated Goods (Publication Number GAO-10-423) (April 2010). In addition to piracy and counterfeiting, corporate- and state-sponsored trade secret theft is on the rise and increasing in size and scope. Whether committed by corrupt insiders or foreign actors, the Internet and new technologies have enabled criminals to steal massive amounts of sensitive information almost instantaneously while remaining difficult to detect. See Office of the National Counterintelligence Executive, Foreign Spies Stealing US Economic Secrets in Cyberspace, available at http://www.ncix.gov/publications/ reports/fecie_all/Foreign_Economic_Collection_2011.pdf. As leaders in innovation, U.S. companies are prime targets for the misappropriation of valuable and sensitive trade secrets, particularly by foreign competitors. Trade secrets may represent years of research and development to a company, with billions of dollars in related costs, and may constitute a substantial portion of the company’s worth. Trade secret theft can financially devastate an individual victim and, when committed for the benefit of a foreign entity, can undermine the economic competitiveness of the U.S. as a whole. In cases involving critical technologies with military or other sensitive applications, trade secret theft can also pose a risk to national security. Recognizing the escalating and serious threats posed by IP crime, Congress, the Administration, and the Department of Justice have all taken steps to enhance IP enforcement domestically and abroad. In the last five years, Congress has enacted several major pieces of legislation to enhance criminal enforcement tools to combat IP crime, including amendments to the statutes criminalizing trademark counterfeiting, criminal copyright infringement, and economic espionage. As of the writing of this Manual, the United States Sentencing Commission is considering amendments to the Sentencing I. Intellectual Property—An Introduction 3 Guidelines applicable to offenses involving trade secret theft, counterfeit drugs, and counterfeit military goods or services. In the Prioritizing Resources and Organization for Intellectual Property Act of 2008 (PRO-IP Act), Pub. L. No. 110-403, § 101, 122 Stat. 4256 (2008), Congress established the Intellectual Property Enforcement Coordinator (IPEC) position to serve in the Executive Office of the President. Among other things, the IPEC brings a coordinated government-wide approach to IP enforcement. The Department worked closely with the IPEC in developing the 2010 Joint Strategic Plan on Intellectual Property Enforcement (June 2010) and the 2013 Joint Strategic Plan on Intellectual Property Enforcement (forthcoming), the IPEC’s Annual Report on IP Enforcement, the Administration’s White Paper on Intellectual Property Enforcement Legislative Recommendations (March 2011), and the Administration Strategy on Mitigating the Theft of U.S. Trade Secrets (February 2013), among other efforts. See http://www. whitehouse.gov/omb/intellectualproperty. The Department plays a significant role in implementing the criminal enforcement aspects of the Administration’s strategies. Attorney General Holder has also made the investigation and prosecution of IP crime a top law enforcement priority. Although a well-developed civil enforcement regime in the U.S. allows IP owners to enforce their rights and obtain compensation for losses, civil enforcement alone is insufficient to address the increasingly sophisticated nature and broad scope of IP infringement. Criminal sanctions are critical to deter and hold accountable the most egregious IP violators. To this end, in February 2010, the Attorney General established a Task Force on Intellectual Property as part of a Department-wide initiative to confront the growing number of domestic and international IP crimes. The IP Task Force, chaired by the Deputy Attorney General and comprising senior Department officials from components with a stake in IP enforcement, including the Criminal Division and Executive Office of the U.S. Attorneys, has brought a coordinated approach and high-level support to the Department’s overall efforts to combat IP crime. See http://www.justice.gov/dag/iptaskforce/. Through the IP Task Force, the Department recommends that prosecutors prioritize IP investigations and prosecutions involving health and safety, trade secret theft and economic espionage, and large-scale criminal copyright infringement and trademark counterfeiting. Prosecutors are also encouraged to pay particular attention to those offenses committed or facilitated by use of the 4 Prosecuting Intellectual Property Crimes Internet, perpetrated by organized criminal networks or repeat offenders, and those cases that are international in scope. The Department pursues a three-front approach to ensure aggressive and effective prosecution. First, the Criminal Division’s Computer Crime and Intellectual Property Section (CCIPS), based in Washington, D.C., provides a core team of expert IP prosecutors who investigate, prosecute, and coordinate national multi-district and international IP cases. This group of specialists helps develop and implement the Department’s overall IP enforcement strategy, and provides training and 24/7 support to Assistant U.S. Attorneys nationally. This Manual, for instance, is one of the training tools that CCIPS provides. Second, because primary responsibility for prosecution of federal crimes generally—and IP offenses specifically—falls to the ninety-three U.S. Attorneys’ Offices across the U.S. and its territories, the Department has designated at least one, and often more than one, Computer Hacking and Intellectual Property (“CHIP”) Coordinator in every U.S. Attorney’s Office in the country. CHIP Coordinators are Assistant U.S. Attorneys with specialized training in prosecuting IP and computer crime offenses and who serve as subjectmatter experts within their districts. As of this writing, there are over 260 CHIP prosecutors designated to handle both computer crime and IP matters nationwide. Third, CHIP Units augment the extensive network of CHIP prosecutors. Each CHIP Unit consists of a concentrated number of trained Assistant U.S. Attorneys in the same office. CHIP Units are strategically located in districts that experience a higher incidence of IP and cyber-crime, or where such crimes have the highest economic impact. These specialized squads focus on prosecuting IP offenses such as trademark counterfeiting, criminal copyright infringement, and theft of trade secrets. In addition, they prosecute hightechnology offenses including computer hacking, virus and worm proliferation, Internet fraud, and other attacks on computer systems. CHIP Unit attorneys are also actively involved in regional training of other prosecutors and federal agents on conducting high-tech investigations, and they work closely with victims of IP theft and cybercrime on prevention efforts. The combined prosecution efforts of the CHIP network, CHIP Units, and CCIPS create a formidable enforcement network to combat IP crime. These enforcement efforts will be even more critical in the future, as advances in I. Intellectual Property—An Introduction 5 technology, and the increasingly important role IP plays in the U.S. and global economy, continue to present new challenges. B. What Is Intellectual Property? Similar to the way the law recognizes ownership rights in material possessions such as cars and homes, it also grants rights in intangible property, such as the expression of an idea or an invention. Federal law protects IP in four distinct areas: copyright, trademark, patent, and trade secrets. 1. Copyright Copyright law is designed to foster the production of creative works and the free flow of ideas by providing legal protection for creative expression. Copyright protects the copyright holder against the infringement of any of six exclusive rights in “original works of authorship fixed in any tangible medium of expression,” including: computer software; literary, musical, and dramatic works; motion pictures and sound recordings; and pictorial, sculptural, and architectural works. See 17 U.S.C. § 102(a). The six exclusive rights are the rights of reproduction, public distribution, public performance, public display, preparation of derivative works, and public performance by digital audio transmission. 17 U.S.C. § 106. Copyright law protects the physical expression of an idea, but not the idea itself. Therefore, legal protection exists as soon as the work is expressed in tangible form, but not before. Although civil and criminal law contain protections for all the copyright owner’s exclusive rights, criminal enforcement focuses primarily on the distribution and reproduction rights, the only two rights for which the violation can be a felony offense subject to higher criminal penalties. See 17 U.S.C. § 506(a) and 18 U.S.C. § 2319. Those convicted of criminal felony copyright infringement face up to five years’ imprisonment and a $250,000 fine. Id. 2. Trademarks and Service Marks The federal law of trademarks and service marks protects a commercial identity or brand used to identify a product or service to consumers. The Lanham Act, 15 U.S.C. §§ 1051-1127, prohibits the unauthorized use of a trademark, which is defined as “any word, name, symbol, or device” used by a person “to identify and distinguish his or her goods, including a unique product, from those manufactured or sold by others and to indicate the source of the goods.” 15 U.S.C. § 1127. By registering trademarks and service marks 6 Prosecuting Intellectual Property Crimes with the U.S. Patent and Trademark Office, the owner is granted the exclusive right to use the marks in commerce in the United States, and can exclude others from using the mark, or a comparable mark, in a way likely to cause confusion in the marketplace. A protected mark might be the name of the product itself, such as “Pfizer” or “L.L.Bean”, a distinguishing symbol, such as the Nike “Swoosh” or the MGM lion, or a distinctive shape and color, such as the blue diamond shape of a Viagra tablet. Certain symbols like the Olympic rings also receive protection. Legal protections for trademarks and service marks not only help protect the goodwill and reputation of trademark owners, but also promote fair competition and the integrity of the marketplace. Additionally, they protect consumers by helping to ensure they receive accurate information about the origins of products and services. Federal criminal law has long prohibited trafficking in goods or services that bear a counterfeit mark. 18 U.S.C. § 2320. As discussed more fully in subsequent chapters, in 2012, the criminal trademark statute was amended to create new offenses and higher penalties for trafficking in counterfeit drugs and certain counterfeit military goods or services. Individuals convicted of § 2320 offenses generally face up to 10 years’ imprisonment and a $2 million fine. If the offense involved serious bodily injury, counterfeit drugs, or counterfeit military goods or services, individuals face up to 20 years in prison and a $5 million fine. 3. Patents Patents protect the world of inventions. In its simplest form, a patent is a property right for an invention granted by the government to the inventor. A patent gives the owner the right to exclude others from making, using, and selling devices that embody the claimed invention. See 35 U.S.C. § 271(a). Patents generally protect products and processes, not pure ideas. Thus, Albert Einstein could not have received a patent for his theory of relativity, but methods for using this theory in a nuclear power plant are patentable. Inventors must file for patent protection with the U.S. Patent and Trademark Office. There are three types of patents: utility, design, and plant. Utility patents are the most common form and are available for inventions that are novel, non-obvious, and useful; that is, “any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof.” 35 U.S.C. § 101. Examples of utility patents include the ingredients I. Intellectual Property—An Introduction 7 of Silly Putty (1949) and the diagnostic x-ray system known as the CAT-Scan (1975). Unlike copyright and trademark infringement, there are no criminal—only civil—penalties for committing patent infringement. However, there are some criminal and quasi-criminal penalties for certain conduct related to patents. 4. Trade Secrets A trade secret can be any form or type of commercially-valuable information that the owner has taken reasonable measures to keep secret and that has an independent economic value from the fact that it is secret and cannot be readily ascertained by the public. Trade secrets can include, for example, technical, scientific, and engineering data, business records, or economic and financial information. See 18 U.S.C. § 1839(3). One of the most famous trade secrets is the formula for manufacturing Coca-Cola. The Coca-Cola formula was recognized as a trade secret in 1920, at which time a court noted that the formula had been continuously maintained as a trade secret since the company’s founding in 1892. See Coca-Cola Bottling Co. v. Coca-Cola Co., 269 F. 796 (D. Del. 1920) (holding that Coca-Cola retained legal title to its formula upon entering a bottling contract because it kept the formula secret). And, it remains Coca-Cola’s most closely guarded trade secret to this day. See http://www.worldofcoca-cola.com/secret-vault.htm. Trade secrets are broader in scope than patents, and include scientific and business information (e.g., market strategies). However, the information can be freely used if it is obtained or learned through legitimate means, such as reverse engineering. Moreover, if the trade secret is publicly disclosed, it generally loses its legal protection. The theft of trade secrets is punishable by up to 15 years’ imprisonment and a $5 million fine if committed to benefit a foreign government or agent, see 18 U.S.C. § 1831, and up to ten years’ imprisonment and a $250,000 fine in other cases, see 18 U.S.C. § 1832. 8 Prosecuting Intellectual Property Crimes II. Criminal Copyright Infringement— 17 U.S.C. § 506 and 18 U.S.C. § 2319 Willful copyright infringement is criminalized by 17 U.S.C. § 506(a), which defines what conduct is prohibited, and 18 U.S.C. § 2319, which sets the penalties for such conduct. Felony penalties can attach either when the violation consists of the reproduction or distribution of at least ten copies having a total retail value of at least $2,500 or, under amendments enacted in 2005, when the violation involves online distribution of a “pre-release” work not yet available on the legitimate market over a publicly-accessible computer network. This Chapter provides an overview of copyright law, an analysis of the elements of copyright infringement, a review of the defenses to the crime, and a summary of the statutory penalties arising from convictions. This chapter also explores some of the novel copyright infringement issues presented by new technologies. Forms providing sample indictments and jury instructions for criminal copyright infringement are provided in Appendix B. Prosecutors may also wish to consult Nimmer on Copyright, a leading treatise on copyright law, with many of its sections being cited by courts as if they were black-letter law, including a chapter on criminal offenses. See Melville B. Nimmer & David Nimmer, Nimmer on Copyright (2011). Other major treatises and articles that may be instructive include William F. Patry, Patry on Copyright (2012); Copyright Law and Practice (1994 & Supps. 19952000); Ronald D. Coenen Jr. et al., Intellectual Property Crimes, 48 Am. Crim. L. Rev. 849 (2011); Michael Coblenz, Intellectual Property Crimes, 9 Alb. L.J. Sci. & Tech. 235 (1999). 9 A. Overview 1. What Copyright Law Protects In the United States, copyright law has a two-part goal: to protect the rights of authors, and thereby, to foster development of more creative works to benefit the public. The Constitution, in granting Congress the power to enact intellectual property laws, describes this goal and the means to achieve it: “[t]o promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” U.S. Const., art. I, § 8, cl. 8. Maintaining an appropriate balance between the rights and incentives for authors, and encouraging dissemination of knowledge and information by and to the public, is a constant theme throughout the history of copyright law. See Twentieth Century Music Corp. v. Aiken, 422 U.S. 151, 156 (1975). Copyright law grants the creator of an original work of expression, fixed in a tangible medium, a “copyright,” which is the exclusive right, protected for a limited period of time, to copy, distribute, and make certain other uses of the work. See 17 U.S.C. § 102(a) (Copyright law protects “original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.”) (emphasis added). “Originality” in copyright law is a low threshold: the work need only have been independently created by the author, as opposed to copied from another, previous work, and it must possess only a minimal degree of creativity. See Section B.1.a. of this Chapter. An important limitation of copyright is that it protects only the creative expression of an idea, but not the idea itself. See Section B.1.a. of this Chapter. Novel ideas, methods, and processes may enjoy protection under patent law (or other areas of law, such as trade secret protection), but are not copyrightable. For example, consider a microbiologist who invents a new technique for modifying particular genes in a cell, then writes an article for a magazine that describes the technique. The article may be protected by copyright as the author’s original expression of his or her ideas regarding this new technique. The technique itself, however, would not be copyrightable, although it may be patentable. Copyrights are also distinct from trademarks, which protect the exclusive use of certain names, pictures, and slogans used in connection with goods or services. Trademarks need not be original or creative and may consist of short 10 Prosecuting Intellectual Property Crimes single words or phrases that are ineligible for copyright protection. Trademarks are discussed in Chapter III of this Manual. Despite the differences between copyrights and trademarks, there are instances in which a single items may be both copyrighted and trademarked; an iconic example of such an item would be the image of Disney’s Mickey Mouse. 2. Legal Basis for Copyright and Related Laws The Constitution grants Congress the power to regulate copyright: “[t]o Promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries,” U.S. Const., art. I, § 8, cl. 8. Congress also derives authority to regulate some copyright-related issues from the Commerce Clause, U.S. Const. art. I, § 8, cl. 3. Copyright protection is principally statutory. Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 429-31 (1984). Federal copyright statutes are found primarily in Title 17 of the U.S. Code, of which sections 101 through 1101 are known as the “Copyright Act,” a reference to the last major overhaul of copyright statutes in the 1976 Copyright Act. The offenses for criminal copyright infringement are set forth in 17 U.S.C. § 506 and the related penalties are set forth in 18 U.S.C. § 2319. The first sale and fair use defenses to copyright infringement, originally common law doctrines, have been codified in the Copyright Act at 17 U.S.C. §§ 107, 109, respectively. Additionally, because courts often interpret copyright law in light of new events and technological developments, there exists significant judge-made law that might not otherwise be obvious from the statutes. E.g., Metro Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 545 U. S. 913 (2005); Sony, 464 U.S. 417. 3. Relevance of Civil Cases to Criminal Prosecutions The vast majority of copyright case law is civil, rather than criminal, and often civil cases provide the only judicial authority available in criminal prosecutions. In this regard, civil precedent is often instructive to criminal copyright statutes. See United States v. Wise, 550 F.2d 1180, 1188 n.14 (9th Cir. 1977) (noting “general principle in copyright law of looking to civil authority for guidance in criminal cases”); see also United States v. Manzer, 69 F.3d 222, 227 (8th Cir. 1995) (same); United States v. Cross, 816 F.2d 297, 303 (7th Cir. 1987) (same, with respect to jury instructions); Kelly v. L.L. Cool J., 145 F.R.D. II. Criminal Copyright Infringement 11 32, 39 (S.D.N.Y. 1992) (noting that conduct that does not support a civil action for infringement cannot constitute criminal infringement); 4 Nimmer on Copyright § 15.01. Criminal penalties, however, apply to only a subset of conduct constituting copyright infringement, and what makes a good civil case does not necessarily make a good criminal case. For example, a defendant can be civilly liable for copyright infringement as a matter of strict liability, with no intent to infringe. See Bright Tunes Music Corp. v. Harrisongs Music, Ltd., 420 F. Supp. 177 (S.D.N.Y. 1976) (finding infringement where composer “subconsciously” copied earlier song). By contrast, a criminal copyright defendant can be convicted only if he infringed willfully. See Section B.2. of this Chapter. 4. Federal Preemption Copyright law is primarily a matter of federal law. For most of the history of the United States, state- and common-law copyright protections coexisted with federal copyright laws. See, e.g., Wheaton v. Peters, 33 U.S. 591, 597-98 (1834). But the Copyright Act of 1976 amended Title 17 to preempt state laws that provide rights “equivalent to” rights granted under federal copyright law. 17 U.S.C. § 301(a). Despite this preemption, copyright law continues to be intertwined with state law in certain cases, such as those involving license agreements and other contracts governing ownership and use of copyrighted works. E.g., Storage Technology Corp. v. Custom Hardware Eng’g & Consulting, Inc., 421 F.3d 1307 (Fed. Cir. 2005). State copyright law also continues to apply to sound recordings recorded before 1972 because sound recordings were not protected by federal copyright law until that year. Consequently, pre-1972 sound recordings may still be protected by state copyrights for several more decades. See La Cienega Music Co. v. ZZ Top, 53 F.3d 950 (9th Cir. 1995); 17 U.S.C. § 301(c). Although § 301 preempts state laws that provide protection equivalent to federal copyright law, a number of states have adopted criminal laws against unauthorized copying or distribution of copies that are directed toward the same types of piracy and counterfeiting targeted by federal criminal copyright laws. For example, most states have adopted statutes (often known as “true names” or “true name and address” laws) that require distributors of copies of certain classes of works (generally recorded music or films) to identify on the copies themselves the name and address of the manufacturer or distributor of those copies. See, e.g., Cal. Penal Code § 653w(a)(1) (unlawful to sell recordings 12 Prosecuting Intellectual Property Crimes that do not “clearly and conspicuously disclose the actual true name and address of the manufacturer”); Ga. Code § 16-8-60(b) (unlawful to distribute recorded music or film unless copies bear true name and address of producer); Mich. Comp. Laws Ann. § 752.1053 (criminal offense to distribute recordings knowing they do not bear the true name and address of manufacturer); N.Y. Penal Law §§ 275.35, 275.40 (unlawful to commercially distribute recordings that do not bear true name and address of manufacturer or performer); Virginia Code § 59.1-41.4 (“Recorded devices” must show true name of manufacturer). These types of state law have been upheld against preemption challenges. See, e.g., Anderson v. Nidorf, 26 F.3d 100, 102 (9th Cir. 1994) (California “true names” statute not preempted by § 301 in sound recording case); Briggs v. State, 638 S.E.2d 292 (Ga. 2006) (Georgia “true names” statute not preempted because lack of identifying label was “extra element” not present in federal copyright law). 5. When Copyright Protection Begins and Ends A work is protected by copyright law from the moment it is created. See 17 U.S.C. §§ 101-102(a), 408(a). Neither publication of the work nor registration of the work with the Register of Copyrights is a prerequisite to copyright protection; however, these acts may affect the remedies available for infringement. For example, registration is a prerequisite to a copyright holder’s civil suit for infringement, at least in the case of U.S. works. See 17 U.S.C. § 411. If a work is registered only after infringement has occurred, a copyright owner may still collect actual damages for infringement committed prior to registration, but cannot collect statutory damages or attorneys’ fees. See 17 U.S.C. § 412. As clarified in the Prioritizing Resources and Organizations for Intellectual Property (PRO-IP) Act of 2008, Pub. L. No. 110-403, § 101, 122 Stat. 4256, 4257-58 (2008), registration of a copyright is not a prerequisite to criminal prosecution for infringement of that work, although copyright registration is helpful in proving the elements of a criminal case, as discussed in Section B.1. of this Chapter. Works created in 1978 or later are protected by copyright for the life of the author plus 70 years. See 17 U.S.C. § 302(a). For a work with one or more joint authors, the life of the surviving author is used. 17 U.S.C. § 302(b). Works made for hire (i.e., works made by or at the behest of a corporation) and anonymous works are protected for 95 years from the date of first publication, or 120 years from creation (whichever comes first). 17 U.S.C. § 302(c). Most II. Criminal Copyright Infringement 13 works created prior to 1978 are protected for 95 years from the date the copyright in the work was first secured (generally the date of publication). 17 U.S.C. § 304. 6. The Rights Protected by Copyright Copyrighted law grants copyright holders the following six exclusive rights to their works: (1) reproduction, (2) preparation of derivative works based upon the original copyrighted work, (3) public distribution, (4) public performance of certain types of works, (5) public display of certain types of works, and (6) performance of sound recordings by means of digital audio transmission. See 17 U.S.C. § 106(1)-(6); 17 U.S.C. § 101 (defining “sound recording” to exclude audiovisual works); 17 U.S.C. § 114(j)(5) (excluding transmission of audiovisual works from the definition of “digital audio transmission”); 17 U.S.C. § 114(d) (limitations including exemptions for certain broadcast transmissions, subscription transmissions, and licensed transmissions). In March 2011, the Office of the Intellectual Property Enforcement Coordinator recommended expanding the performance right in sound recordings to include other, non-digital audio transmissions (such as traditional broadcast radio), and bills have been introduced in Congress to effect similar changes. See Administration’s White Paper on Intellectual Property Enforcement Legislative Recommendations at 10 (March 2011), available at http://www.whitehouse. gov/sites/default/files/ip_white_paper.pdf; Performance Rights Act, H.R. Rep. No. 111-680 (2010) (H.R. 848; S. 379). As of this writing, however, U.S. copyright law grants an exclusive performance right in sound recordings only as to digital audio transmissions. The exclusive rights set forth in 17 U.S.C. § 106 are subject to a number of exceptions and limitations described in §§ 107-122, such as the right to make limited or “fair use” of a work without permission, to resell or transfer one’s own lawful copy of a work, and to reproduce a lawful copy of computer software either as an essential step in using it or to make an archival copy. Those exceptions are addressed throughout this Chapter. Exercising one of the exclusive rights under § 106 without the copyright holder’s authorization, or other legal authority, constitutes copyright infringement. 17 U.S.C. § 501. The exclusive rights granted in § 106 are broad, and include a variety of commercial and noncommercial activities. However, not every unlicensed or unauthorized use of a copyrighted work constitutes an infringement, as many uses will either fall outside the scope of § 106, or be 14 Prosecuting Intellectual Property Crimes specifically exempted by §§ 107-122. “An unlicensed use of the copyright is not an infringement unless it conflicts with one of the specific exclusive rights conferred by the copyright statute.” Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 447 (1984) (citation omitted); see also Benjamin Kaplan, An Unhurried View of Copyright 57 (1967) (“The fundamental [is] that ‘use’ is not the same thing as ‘infringement,’ that use short of infringement is to be encouraged ....”). 7. When Infringement Is Criminal Any instance of infringement will generally entitle a copyright owner to a civil remedy, such as damages or injunctive relief. But not every infringement is a criminal offense. Throughout the history of copyright in the United States, criminal copyright penalties have been the exception rather than the rule. Although criminal copyright law has greatly expanded the scope of the conduct it penalizes over the past century, criminal sanctions continue to apply only to certain types of infringement—generally when the infringer knows the infringement is wrong, and when the infringement is particularly serious or the type of case renders civil enforcement by individual copyright owners especially difficult. As described in more detail below, a willful violation of any exclusive right for commercial advantage or private financial gain is a misdemeanor, whereas only a violation of the rights to reproduction and distribution under certain circumstances constitutes felony infringement. Copyright infringement is a crime if the defendant infringed willfully and did so either (1) for commercial advantage or private financial gain, (2) by reproducing or distributing one or more infringing copies of works with a total retail value of over $1,000 over a 180-day period, or (3) by distributing a “work being prepared for commercial distribution” by making it available on a publicly-accessible computer network. 17 U.S.C. § 506(a)(1). Criminal copyright infringement is punishable as a felony if the criminal conduct described above involved reproduction or distribution of at least ten copies of copyrighted works worth more than $2,500 in a 180-day period, or involved distribution of a “work being prepared for commercial distribution” over a publicly-accessible computer network. See id.; 18 U.S.C. § 2319. II. Criminal Copyright Infringement 15 B. Elements There are three essential copyright crimes: 1. Willful infringement “for purposes of commercial advantage or private financial gain,” 17 U.S.C. § 506(a)(1)(A). 2. Willful infringement by “the reproduction or distribution, including by electronic means, during any 180-day period, of 1 or more copies or phonorecords of 1 or more copyrighted works, which have a total retail value of more than $1,000,” 17 U.S.C. § 506(a)(1)(B). Note that this type of infringement does not have a financial component. 3. Willful infringement “by the distribution of a work being prepared for commercial distribution, by making it available on a computer network accessible to members of the public, if such person knew or should have known that the work was intended for commercial distribution,” 17 U.S.C. § 506(a)(1)(C) (enacted in 2005). This violation, enacted in 2005, is commonly referred to as “pre-release” piracy and also does not have a financial component. The common factors for all criminal copyright offenses are that (1) there must be a valid copyright, (2) there must be an infringement, and (3) the infringement must be willful. Some courts also require that the government prove an extra element: that the infringing items at issue were not permissible “first sales,” although most courts hold the issue of “first sale” to be an affirmative defense. See Section C.4. of this Chapter. Felony copyright infringement only occurs when the defendant willfully infringed a copyright by reproduction and distribution and only in the following ways: 1. by (a) reproducing or distributing, “including by electronic means;” (b) “during any 180-day period;” (c) “at least 10 copies or phonorecords, of 1 or more copyrighted works;” (d) that have a “total retail value of more than $2,500.” 18 U.S.C. § 2319(b)(1); OR 2. by (a) distributing a work; (b) that is “being prepared for commercial distribution;” (c) by “making it available on a computer network;” (d) “[knowing it] was intended for commercial distribution.” 17 U.S.C. § 506(a)(1)(C); 18 U.S.C. § 2319(d). 16 Prosecuting Intellectual Property Crimes Although felony copyright infringement does not require a profit motive, the maximum penalties will increase from three years to five if the offense is committed for commercial advantage or private financial gain. 18 U.S.C. §§ 2319(b)(1), (d)(2). In other words, there are four essential elements to a charge of felony copyright infringement: 1. A valid copyright exists (see Section B.1. of this Chapter); 2. The defendant acted willfully (Section B.2. of this Chapter); 3. The defendant infringed the copyright by reproduction or distribution of the copyrighted work, or for violations of 17 U.S.C. § 506(a)(1)(C), by distribution (Section B.3.a. of this Chapter); 4. The infringement consisted of either of the following: (a) reproduction or distribution of at least 10 copies of one or more copyrighted works with a total retail value of more than $2,500 within a 180-day period (Section B.3.b. of this Chapter); OR (b) distribution (i) of copies of a “work being prepared for commercial distribution” (ii) by making such copies available on a publicly-accessible computer network (iii) when the defendant knew or should have known the work was being prepared for commercial distribution (Section B.3.c. of this Chapter). Repeat felonies are subject to increased maximum penalties. See 18 U.S.C. § 2319(b)(2), (c)(2), (d)(3)-(4). Amendments to the criminal copyright statutes in 1997 and 2005 significantly changed the elements of felony copyright infringement. See No Electronic Theft Act (NET) Act, Pub. L. No. 105-147, 111 Stat. 2678 (1997) (removing the financial requirement for felony infringement); Family Entertainment and Copyright Act of 2005, Pub. L. No. 109-9 § 103, 119 Stat. 218, 220-21 (2005) (creating a felony for pre-release piracy and camcording in a movie theater, among other things); see also Prioritizing Resources and Organizations for Intellectual Property (PRO-IP) Act of 2008, Pub. L. No. 110-403, 122 Stat. 4256 (2008) (clarifying forfeiture authority for property II. Criminal Copyright Infringement 17 used to facilitate criminal copyright and other intellectual property offenses). Cases predating these statutes should not necessarily be relied upon for delineating the elements of current copyright offenses, but they remain useful in interpreting the current law’s elements. 1. Existence of a Copyright Under 17 U.S.C. § 506(a), the initial element of criminal copyright infringement is that a valid copyright exists in the work or works in question. While on its face this element may appear the simplest to prove, a number of issues can add considerable complexity. a. Copyrightability Copyright law protects all “original works of authorship fixed in any tangible medium of expression ....” 17 U.S.C. § 102(a) (emphasis added). i. Original Work Fixed in a Tangible Medium The subject matter of copyright is defined by two requirements: originality and fixation. A work must be an original, creative expression of an idea or concept, and it must be recorded in tangible form. Thus, copyright law protects a novel or poem written on paper or typed in a computer, a song recorded in a studio or written on sheet music, a sculpture modeled in clay or bronze, or a computer program on a computer’s hard disk. For copyright purposes, “original” has two requirements. First, the work must have been independently created by the author, as opposed to copied from another previous work. A work can be original even if it closely resembles another work, “so long as the similarity is fortuitous, not the result of copying.” Feist Publ’ns, Inc. v. Rural Telephone Co., 499 U.S. 340, 345-46 (1991) (citing Sheldon v. Metro-Goldwyn Pictures Corp., 81 F.2d 49, 54 (2d Cir. 1936) (noting that identical poems created by different poets ignorant of one another would both be original and copyrightable)). In practice, the odds against an artist or author or musician creating a new work identical to an existing one, without knowing of the earlier work, are remote, and in cases involving suspiciouslysimilar works, where the later artist had access or opportunity to learn of the earlier work, courts have found the subsequent work infringing. See, e.g., Bright Tunes v. Harrisongs Music, 420 F. Supp. 177 (S.D.N.Y. 1976). Second, the work must also possess “at least some minimal degree of creativity.” Feist, 499 U.S. at 345. The amount of creativity required for originality is extremely low; 18 Prosecuting Intellectual Property Crimes “a slight amount” of “creative spark” is all that is necessary, “no matter how crude, humble or obvious.” Id. (citing 1 Nimmer on Copyright §§ 2.01[A], [B] (1990)). What qualifies as “original” for copyright purposes may not be considered “original” by, for example, those assessing the item’s artistic, literary, or academic merit. Nor should “originality” be confused with “novelty,” which is the touchstone of patent law, not copyright. See Chapter VII of this Manual. To be copyrightable, a work must also be “fixed,” meaning the work is recorded in some tangible medium by the author. For example, a song that is composed onto sheet music or recorded to tape is fixed and thus copyrightable, but a live performance of a song that is not recorded by the performer (or someone authorized by the performer) would not be fixed, and thus the performance itself would not be copyrightable, although the performance might still enjoy protection under other laws. See the discussion of 18 U.S.C. § 2319A in Section F. of this Chapter. ii. Short Phrases Are Not Copyrightable Short single words, short phrases, and familiar symbols and designs generally cannot be copyrighted. 37 C.F.R. § 202.1(a) (2004). They may, however, be trademarked and thus protected under 18 U.S.C. § 2320; see Chapter III of this Manual. iii. Expression of an Idea vs. Idea Itself An important limitation of copyright is that it protects only the creative expression of an idea—but not the idea itself. 17 U.S.C. § 102(b) (“In no case does copyright protection ... extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery ....”); see also Feist, 499 U.S. at 344-45; Mannion v. Coors Brewing Co., 377 F. Supp. 2d 444 (2005); Whelan Assoc. v. Jaslow Dental Lab., 797 F.2d 1222 (3d Cir. 1986). Novel ideas, methods, and processes may enjoy protection under trade secret or patent law, but are not copyrightable. See Chapters IV and VII of this Manual. For example, consider a new technique for modifying genes in a cell that is described in a magazine article. Although the article might be copyrightable— as an original expression of the author’s ideas about this new technique—the technique itself would not. The technique might, however, be patentable. II. Criminal Copyright Infringement 19 b. Copyrights vs. Registrations vs. Certificates The notion of having a valid copyright is easily confused with the issue of whether the work is registered with the Copyright Office, or with possession of a valid copyright certificate issued by the Copyright Office. Throughout much of U.S. history, copyright protection was predicated on certain formal requirements, such as the need to register published works with the Copyright Office, deposit copies with the Library of Congress, and mark copies of the work with a copyright notice. However, major revisions to copyright law in the 1970s and 1980s eased these requirements, and now protect a copyrightable work regardless of whether such formalities have been observed. See La Resolana Architects, PA v. Clay Realtors Angel Fire, 416 F.3d 1195, 1198-1205 (10th Cir. 2005), abrogated on other grounds by Reed Elsevier, Inc. v. Muchnick, 130 S.Ct. 1237 (2010). For a work created on or after January 1, 1978, copyright subsists from the moment an original work of authorship is created by “fix[ing it] in any tangible medium of expression.” 17 U.S.C. § 102(a); see also id. § 302(a). That is, a work is copyrighted the moment it is created, regardless of whether it has been registered or bears a copyright notice. A “copyright” is the author’s legal entitlement to the exclusive rights granted under 17 U.S.C. § 106. Neither a copyright registration nor a registration certificate is equivalent to a copyright. A registration certificate signifies the Copyright Office’s decision to register the work, which is a limited administrative decision that the work is copyrightable subject matter and that the application is proper. See 17 U.S.C. § 408(a). Although not dispositive of whether a valid copyright exists, the Copyright Office’s decision to issue a registration and the certificate of registration can, however, have legal significance at trial. See Sections B.1.d.-e. of this Chapter. c. “Preregistration” of Certain Types of Works The Family Entertainment and Copyright Act of 2005 created a new procedure, known as “preregistration,” intended to address some problems with works that are pirated before their lawful publication or official release by the copyright owner. See Pub. L. No. 109-9 § 104, 119 Stat. 218, 221-22 (Apr. 27, 2005); 17 U.S.C. §§ 408(f ) (setting forth basic rules for preregistration), 411(a) (preregistration or registration necessary to institute infringement action in most cases); 37 C.F.R. § 202.16 (Copyright Office rules for preregistration). Preregistration is available for certain types of work judged by the Copyright Office to be especially vulnerable to piracy before their lawful release or 20 Prosecuting Intellectual Property Crimes publication, including movies, musical compositions and sound recordings, computer software and video games, literary works, and “advertising and marketing photographs.” See id. A copyright owner can preregister these types of works if they are unpublished, but “being prepared for commercial distribution,” meaning that the copyright owner has a reasonable expectation that the work will be commercially distributed to the public, and the work, if not yet finished, has at least been commenced. Id. § 202.16(b)(2). Upon submission of an application and fee, the Copyright Office will undertake a limited review of the work, and if approved, it will preregister the work and issue a certificate, much as in the case of copyright registration. Id. § 202.16(c). But preregistration is not a complete substitute for registration. Although preregistration offers some benefits to copyright owners, preregistration involves only a cursory review by the Copyright Office and consequently preregistration, unlike registration, will not serve as prima facie evidence of the validity or ownership of a copyright. 37 C.F.R. § 202.16(c)(6), (7), (13). See Sections B.1.d.-e. of this Chapter. d. Significance of Registration As noted above, a creative work can be protected by copyright even before, or absent, registration of the work with the Copyright Office. Many foreign works of authorship are never registered with the United States Copyright Office, nor are most unpublished works by domestic authors ever registered, and yet such works may still enjoy copyright protection under U.S. law. However, registration of a copyright may be necessary for a copyright owner to enforce such protections civilly. Specifically, U.S. law requires copyright owners to register their works with the Copyright Office as a prerequisite to filing a lawsuit for infringement. Section 411 of Title 17 provides that “no civil action for infringement of the copyright in any United States work shall be instituted until preregistration or registration of the copyright claim has been made in accordance with this title.” § 411(a) (emphasis added). Note that § 411 applies only to “United States work[s],” meaning works first published domestically, or works created by U.S. nationals or “habitual residents.” See 17 U.S.C. §§ 101, 411(a). Thus, before a civil lawsuit for infringement of a United States work can be initiated, the work must be registered, although registration is not a prerequisite to filing a law suit for infringement of a foreign work (nor is registration a prerequisite for criminal enforcement, as discussed below). II. Criminal Copyright Infringement 21 Some aspects of the § 411 registration requirement are the subject of disagreements among the federal courts. For example, courts continue to disagree over which specific steps § 411 requires to be satisfied prior to the filing of a lawsuit. Although some courts require only that a copyright owner submit a facially valid application and required fee to the Copyright Office before filing suit, most conclude that § 411’s language (that a registration must be “made” prior to suit) means the Copyright Office must have either accepted and approved the registration, or formally rejected it as invalid, prior to the filing of a lawsuit. Compare Lakedreams v. Taylor, 932 F.2d 1103, 1108 (5th Cir. 1991) (Section 411 requires only the filing of an application before suit may be filed); Apple Barrel Prods., Inc. v. Beard, 730 F.2d 384, 386-87 (5th Cir. 1984) (same); Prunte v. Universal Music Group, 484 F. Supp. 2d 32 (D.D.C. 2007) (same) with La Resolana Architects, PA v. Clay Realtors Angel Fire, 416 F.3d 1195 (10th Cir. 2005) (Section 411 requires Copyright Office to issue or reject registration prior to filing of lawsuit), abrogated on other grounds by Reed Elsevier, Inc. v. Muchnick, 130 S.Ct. 1237 (2010); M.G.B. Homes, Inc. v. Ameron Homes, Inc., 903 F.2d 1486, 1488 (11th Cir. 1990); Mays & Assocs. Inc. v. Euler, Inc., 370 F. Supp. 2d 362, 368 (D. Md. 2005) (Section 411 requires registration as opposed to mere application for copyright); see also Vacheron & Constantin-Le Coultre Watches, Inc. v. Benrus Watch Co., 260 F.2d 637, 64041 (2d Cir. 1958) (filing of suit under pre-1976 law requires that registration process be complete). The Supreme Court in Reed Elsevier, Inc. v. Muchnick, 130 S. Ct. 1237 (2010) resolved another circuit split over the issue of whether registration is, on the one hand, merely a procedural requirement or case-processing rule, or whether, on the other hand, is necessary to confer subject-matter jurisdiction in federal court. Reversing the Second Circuit, the Supreme Court held that although registration is a precondition to filing an action in district court, failure to comply with § 411 does not deprive a federal court of subject matter jurisdiction to hear claims involving unregistered works. The Court, however, declined to address whether registration is a threshold mandatory requirement that district courts may or should enforce by dismissing sua sponte cases involving unregistered works. i. Registration Not a Prerequisite for Criminal Prosecution Copyright registration is not a prerequisite to a criminal prosecution for copyright infringement. The Prioritizing Resources and Organization for Intellectual Property Act of 2008 (PRO-IP) Act of 2008, Pub. L. No. 110-403, 22 Prosecuting Intellectual Property Crimes 122 Stat. 4256 (2008) clarified this point by amending § 411 to add the word “civil.” Notwithstanding that copyright registration is not a requirement for initiating a criminal prosecution, copyright registration is nevertheless helpful in proving certain elements of the offense at trial and avoiding a number of practical challenges that may result from a lack of registration. See Section B.2.b. of this Chapter. For example, introducing certificates of registration at trial is often the simplest way to prove a copyright’s validity and ownership. Even though registration is not legally required, without it prosecutors will have to prove these elements “from scratch” through testimony and other evidence. See Section B.1.e. of this Chapter. Therefore, to the extent possible, prosecutors should try to ensure that any copyrights on which a prosecution is sought are registered or “preregistered” before the prosecution is commenced. If registration is needed for pending litigation, it can often be expedited for completion within a week. See U.S. Copyright Office, Information Circular 10, “Special Handling,” available at http://www.copyright.gov/circs/circ10. pdf. Copyright certificates or completed registrations are useful prior to trial, but not as critical. So long as the government can present sufficient evidence of a valid copyright to satisfy a probable cause standard, a lack of a copyright registration or certificate should not be an impediment to obtaining search warrants, grand jury subpoenas, and even indictments. When registration is lacking (which may merely be an oversight, or could reflect a conscious choice to delay registration until a work is ready for publication) prosecutors should bear in mind the circumstances surrounding the absence of registration, which may militate against the choice to prosecute. For example, a copyright-holder’s refusal to register his copyright may indicate—or be interpreted as—his intent to allow others to copy the work. If, on the other hand, registration has been sought from the Copyright Office and refused, the refusal may indicate a weak claim of copyrightability or ownership. e. Proof of Copyright at Trial At trial, the government typically proves the existence of a valid copyright by introducing a certificate of registration. The certificate’s probative value depends on whether the work was registered earlier or later than five years after the work was published. A certificate of registration “made before or within five years after first publication of the work shall constitute prima facie evidence of the validity of the copyright.” 17 U.S.C. § 410(c) (emphasis added); see Gaylord II. Criminal Copyright Infringement 23 v. United States, 595 F.3d 1364, 1376 (Fed. Cir. 2010); United States v. Taxe, 540 F.2d 961, 966 (9th Cir. 1976); United States v. Moore, 604 F.2d 1228, 1234 (9th Cir. 1979); see also 17 U.S.C. § 101 (“‘Publication’” is the distribution of copies or phonorecords of a work to the public by sale or other transfer of ownership, or by rental, lease, or lending. The offering to distribute copies or phonorecords to a group of persons for purposes of further distribution, public performance, or public display, constitutes publication. A public performance or display of a work does not of itself constitute publication.”). Once the certificate of registration is introduced by the government and accepted as authentic by the court, the burden shifts to the defendant to prove that the copyright is not valid or that the registration was obtained fraudulently. See, e.g., Gaylord, 595 F.3d at 1376; Autoskill, Inc. v. Nat’l Educ. Support Sys., Inc., 994 F.2d 1476, 1487 (10th Cir. 1993), overruled on other grounds by TW Telecom Holdings Inc. v. Carolina Internet Ltd., 661 F.3d 495 (10th Cir. 2011). Then, the prosecutor may rebut with evidence showing that the certificate is genuine, the registration was properly obtained, or that the copyright is otherwise valid. If the work was registered more than five years after its first publication, the certificate’s probative value is left to the court’s discretion. See 17 U.S.C. § 410(c); Religious Tech. Ctr. v. Netcom On-Line Comm. Servs., Inc., 923 F. Supp. 1231, 1241 (N.D. Cal. 1995); Pan-American Products & Holdings, LLC v. R.T.G. Furniture Corp., 825 F. Supp. 2d 664, 702 (M.D.N.C. 2011); Koontz v. Jaffarian, 617 F. Supp. 1108, 1111-12 (E.D. Va. 1985), aff’d, 787 F.2d 906 (4th Cir. 1986). Certificates of registration should be obtained from the victim. The Copyright Office has an online database of certifications and can provide certified copies. See http://www.copyright.gov/records/; U.S. Copyright Office, Information Circular No. 6, “Obtaining Access to and Copies of Copyright Office Records and Deposits,” available at http://www.copyright.gov/circs/ circ06.pdf. But copyright owners may be able to respond faster, since they should have retained their registration certificates in the ordinary course of their business. Although producing a copyright certificate is the preferred method of proving validity and ownership of a valid copyright, it is not the only way to do so. The parties can stipulate to the copyright’s validity. E.g., United States v. Beltran, 503 F.3d 1, 2 (1st Cir. 2007); United States v. Sherman, 576 F.2d 292, 296 (10th Cir. 1978). Courts may also take judicial notice of a work’s copyright registration. Island Software and Computer Service, Inc. v. Microsoft 24 Prosecuting Intellectual Property Crimes Corp., 413 F.3d 257, 261 (2d Cir. 2005); see also United States v. Hux, 940 F.2d 314, 318 (8th Cir. 1991) (allowing introduction of copyright certificates the morning of trial, but noting other evidence previously given to defense provided ample basis for plaintiff to establish, and defendant to challenge, existence of copyright), overruled on other grounds by United States v. Davis, 978 F.2d 415 (8th Cir. 1992); La Resolana Architects, PA, 416 F.3d at 1208; United States v. Backer, 134 F.2d 533, 535-36 (2d Cir. 1943) (allowing civil proceeding where Copyright Office had provided plaintiff with certificate due to error; technical irregularities in the registration process should not invalidate an otherwise proper registration). For instance, the government could introduce testimony regarding the copyright owner’s creation and fixation of the work, evidence that the work is original, and that it was not a work for hire created for someone else. In cases where the validity of a copyright is likely to be contested, prosecutors may wish to gather additional evidence of the validity of the copyright, such as the type described above. Even where copyright in a work has been registered within five years of publication thus giving rise to a presumption of validity, some courts have cautioned against placing too much weight on registrations as proof of a valid copyright, due to the cursory nature of the copyright registration process. See Universal Furniture Int’l, Inc. v. Collezione Europa USA, Inc., 618 F.3d 417, 428 (4th Cir. 2010); Charles W. Ross Builder, Inc. v. Olsen Fine Home Bldg., LLC, 827 F. Supp. 2d 607, 616 (E.D. Va. 2011); Pan-American Products, 825 F. Supp. 2d at 702. f. Copyright Notice Particularly in cases involving older works, prosecutors should confirm that copyright in a work has not lapsed. Copyright protection expires at the end of the statutory term, which will vary depending on the date of creation, publication, or the author’s death. However, for works first published prior to March 1, 1989, copyright may also have lapsed if the work lacked a valid copyright notice upon its first publication. For works published on or after March 1, 1989, their publication without a copyright notice is of no moment. See Berne Convention Implementation Act of 1988 (“BCIA”), Pub. L. No. 100-568, 102 Stat. 2853 (enacted October 31, 1988). For works published before March 1, 1989, however, initial publication without a copyright notice would have extinguished their copyright and consigned them to the public domain. See 17 U.S.C. §§ 10, 19 et seq. (1909 Act); 17 U.S.C. § 405(a)(2) (1976 Act); see also 2 Nimmer on Copyright §§ 7.02[C][1]-[3], at 7-16 to 7-17. II. Criminal Copyright Infringement 25 Generally speaking, the form of copyright notice generally contains the symbol ©, the word “copyright,” and the name of the copyright owner (e.g., Copyright © 2011 by Jane Doe). As noted in the following Section, the presence of a copyright notice on an infringed work may be useful in proving a defendant’s willfulness. 2. The Defendant Acted “Willfully” a. Legal Standard To establish criminal intent, the government must prove that the defendant infringed the copyright willfully. See 17 U.S.C. § 506(a) (“Any person who willfully infringes a copyright shall be punished ....”) (emphasis added). “[E]vidence of reproduction or distribution of a copyrighted work, by itself, shall not be sufficient to establish willful infringement.” 17 U.S.C. § 506(a)(2). This was intended to require proof of more than general intent and to ensure that, for instance, “an educator who in good faith believes that he or she is engaging in a fair use of copyrighted material could not be prosecuted under the bill.” 143 Cong. Rec. 26,420-21 (1997). The Supreme Court has recognized that “willful ... is a word of many meanings, its construction often being influenced by its context.” Spies v. United States, 317 U.S. 492, 497 (1943). This was reflected in Congressional debate over the NET Act amendments to the Copyright Act. Senator Hatch, the Chairman of the Senate Judiciary Committee, advocated that in copyright crimes “‘willful’ ought to mean the intent to violate a known legal duty,” 143 Cong. Rec. 26,420 (1997), because a lower mens rea could cause “the net” of criminal sanctions “[to] be cast too widely.” Id. Senator Hatch cited several cases in which the Supreme Court had construed “willfulness” in this fashion when the substantive law was complex, such as Cheek v. United States, 498 U.S. 192 (1991), in which the Court held that the general principle that “ignorance of the law or a mistake of law is no defense to criminal prosecution,” must yield given the complexity of federal criminal tax statutes. In other words, the defendant’s good-faith misunderstanding of the legal duties imposed on him by the tax laws would negate a finding of willfulness. Id. at 199. This reasoning has been applied in other contexts as well. E.g., Ratzlaf v. United States, 510 U.S. 135 (1994) (failure to report cash transactions in excess of $10,000). In debate on the corresponding House bill, two of the bill’s sponsors, Representatives Goodlatte and Coble, made comments suggesting that 26 Prosecuting Intellectual Property Crimes the “willfulness” may be met with something less than direct proof that the defendant was actually aware he was violating the law: It should be emphasized that proof of the defendant’s state of mind is not required. The Government should not be required to prove that the defendant was familiar with the criminal copyright statute or violated it intentionally. Particularly in cases of clear infringement, the willfulness standard should be satisfied if there is adequate proof that the defendant acted with reckless disregard of the rights of the copyright holder. In such circumstances, a proclaimed ignorance of the law should not allow the infringer to escape conviction. Willfulness is often established by circumstantial evidence, and may be inferred from the facts and circumstances of each case. 143 Cong. Rec. 24,325 (1997) (statement of Rep. Coble); see also id. at 24,326 (statement of Rep. Goodlatte, repeating passage above verbatim, with the addition of the word “also” after “be” in the first sentence). Although the first sentence of the passage quoted above might suggest Representatives Coble and Goodlatte viewed the criminal copyright offense as a strict liability crime, the context of their statements suggests that both Congressmen meant, not that the criminal copyright offense required no proof of a defendant’s intent or state of mind, but rather that the “willfulness” standard did not require direct evidence of mens rea, and that a “willful” state of mind could be proven circumstantially (or, in their view, through affirmative proof of reckless disregard for the rights of copyright holders). Although the statements of individual members reflect somewhat differing conceptions of the “willfulness” standard, both houses of Congress indicated their intent not to affect the existing “willfulness” standard applicable to copyright crime, other than to clarify that evidence of reproduction or distribution, by itself, was insufficient to prove willfulness. See 17 U.S.C. § 506(a)(2); Statement of Rep. Coble, 143 Cong. Rec. 24,325 (1997) (“Evidence of reproductions or distributions, including those made electronically on behalf of third parties, would not, by itself, be sufficient to establish willfulness under the NET Act.”). Otherwise, Congress left the term’s definition to the courts. See 143 Cong. Rec. 26,422 (remarks of Sen. Leahy) (“This clarification does not change the current interpretation of the word ‘willful’ as developed by case law and as applied by the Department of Justice, nor does it change the definition of ‘willful’ as it is used elsewhere in the Copyright Act.”); H.R. Rep. II. Criminal Copyright Infringement 27 No. 102-997, at 4-5 (1992), reprinted in 1992 U.S.C.C.A.N. 3569, 3572-73 (discussion of Copyright Felony Act, Pub. L. No. 102-561, 106 Stat. 4233 (1992)). Most courts that have interpreted “willfulness” in criminal copyright cases have adopted the more stringent standard articulated by Senator Hatch: the intentional violation of a known legal duty. See United States v. Moran, 757 F. Supp. 1046, 1049 (D. Neb. 1991) (holding that willful infringement means a “‘voluntary, intentional violation of a known legal duty’”) (quoting Cheek v. United States, 498 U.S. 192, 200 (1991)); see also United States v. Sherman, 576 F.2d 292, 297 (10th Cir. 1978) (upholding jury’s verdict because jury “apparently either disbelieved the genuineness of this contract [which defendants claimed had licensed their conduct], or believed that defendants were not innocent of knowledge that the tapes provided were copies from the original artists’ records”, and noting that “willfulness” required proof of specific intent, but without clarifying whether that required proof that the defendants knew their conduct was unlawful, or merely knowledge that they were selling copies); cf. United States v. Heilman, 614 F.2d 1133, 1138 (7th Cir. 1980) (holding that the government had proved willfulness because the defendant “chose to persist in conduct which he knew had ‘a high likelihood of being held by a court of competent jurisdiction to be a violation of a criminal statute’”) (quoting trial court); United States v. Cross, 816 F.2d 297, 300-01 (7th Cir. 1987) (approving without comment a jury instruction that an act is willful when it is committed “voluntarily, with knowledge that it was prohibited by law, and with the purpose of violating the law, and not by mistake, accident or in good faith,” and affirming conviction because the record amply demonstrated that the defendant “knowingly and voluntarily violated the copyright laws”); see also Ronald D. Coenen Jr. et al., Intellectual Property Crimes, 48 Am.Crim. L.Rev. 849, 877-89 (2011). A minority of courts in criminal copyright cases have suggested that a lower standard of “willfulness” may support a criminal prosecution. United States v. Backer, 134 F.2d 533, 535 (2d Cir. 1943) is frequently cited as applying the lower standard, that of merely having the intent to carry out the activities of infringement without knowledge that they constituted infringement. In that case, the defendant had arranged for a manufacturer to duplicate a copyrighted figurine as closely as possible without, in the defendant’s words, “copyright trouble.” Id. at 535. The Second Circuit found the evidence sufficient to support willful infringement, noting there could not “be any fair doubt that 28 Prosecuting Intellectual Property Crimes the appellant deliberately had the copies made and deliberately sold them for profit.” Id. Some commentators have characterized Backer as representing a circuit split. E.g., 4 Nimmer on Copyright § 15.01[A][2] at 15-6 (opining that “[T]he better view construes the ‘willfulness’ required for criminal copyright infringement as a ‘voluntary, intentional violation of a known legal duty.’”); Julie L. Ross, A Generation of Racketeers? Eliminating Civil RICO Liability for Copyright Infringement, 13 Vand. J. Ent. & Tech. L. 55, 85 (2010); Mary Jane Saunders, Criminal Copyright Infringement and the Copyright Felony Act, 71 Denv. U. L. Rev. 671, 673 (1994). It is not clear, however, that Backer represents an actual circuit split. The case can also be read as holding the defendant’s mention of “copyright trouble” to be sufficient evidence of his knowledge of a legal duty not to infringe. Moreover, more recent civil copyright cases suggest that the Second Circuit interprets willfulness to require either actual knowledge that the infringement violated the law, or perhaps “constructive knowledge” shown by reckless disregard for whether the conduct violated copyright. See Twin Peaks Prods., Inc. v. Publ’ns Int’l, Ltd., 996 F.2d 1366, 1382 (2d Cir. 1993) (holding standard for willfulness to be “whether the defendant had knowledge that its conduct represented infringement or perhaps recklessly disregarded the possibility”); Fitzgerald Publ’g Co. v. Baylor Publ’g Co., 807 F.2d 1110, 1115 (2d Cir. 1986) (same); Lydia Pallas Loren, Digitization, Commodification, Criminalization: The Evolution of Criminal Copyright Infringement and The Importance of the Willfulness Requirement, 77 Wash. U. L.Q. 835, 879 (1999) (arguing that the Second Circuit is actually not in disagreement with other circuits). This approach is consistent with the Seventh Circuit’s ruling in United States v. Heilman, a criminal copyright case holding that the government proved willfulness because the defendant “chose to persist in conduct which he knew had a high likelihood of being held by a court of competent jurisdiction to be a violation of a criminal statute.” 614 F.2d 1133, 1138 (7th Cir. 1980) (citation and internal quotation marks omitted). The majority rule in criminal copyright cases for a higher standard of willfulness is also generally consistent with civil copyright cases. The issue arises in civil cases when plaintiffs attempt to recover increased statutory damages, which are available only for willful infringement. 17 U.S.C. § 504(c). Whereas criminal willfulness requires a specific intent to violate “a known legal duty,” civil cases require a more specific intent to violate copyright laws; that is that willfulness is not just an intent to copy, but rather an intent to infringe. 4 II. Criminal Copyright Infringement 29 Nimmer on Copyright § 14.04[B][3][a]; e.g., BC Technical, Inc. v. Ensil Int’l Corp., 464 Fed. Appx. 689 (10th Cir. 2012) (“willful” infringement in civil case requires specific intent to violate copyright laws - also noting without analysis that criminal cases require an intent to violate copyright laws, but relying, in part, on criminal cases and authorities referring to “known legal duty”); Twin Peaks Prods., Inc., 996 F.2d at 1382; Danjaq, L.L.C. v. Sony Corp., 263 F.3d 942, 959 (9th Cir. 2001); RSO Records, Inc. v. Peri, 596 F. Supp. 849, 859 (S.D.N.Y. 1984) (holding, in civil action, that defendant’s earlier guilty plea to two counts of criminal copyright infringement sufficed to show he knew similar conduct was unlawful). Given that willfulness requires an intent to infringe, or at least constructive knowledge of infringement plus a reckless disregard of the victim’s rights, a finding of willfulness may be precluded if the defendant acted with a good-faith belief that he was not infringing. See Section B.2.b. of this Chapter. b. Proof at Trial “Willfulness is rarely provable by direct evidence, and most often can be proven only by inference from the evidence introduced.” United States v. Sherman, 576 F.2d at 297. Certain types of evidence in criminal copyright cases have been found particularly relevant to proving the defendant’s intent: • 30 The defendant’s acknowledgment that his or her conduct was improper. See United States v. Manzer, 69 F.3d 222, 227-28 (8th Cir. 1995) (defendant’s admission in a published interview that selling or giving away copyrighted computer chips was illegal, and software program and packaging bore copyright notice); United States v. Drebin, 557 F.2d 1316, 1324 (9th Cir. 1977) (defendant’s warning customers of FBI investigation and recommending that customers “really be careful”); United States v. Hux, 940 F.2d 314, 319 (8th Cir. 1991) (defendant’s admission to FBI that he knew modifying copyrighted descrambler chips was infringement), overruled on other grounds by United States v. Davis, 978 F.2d 415 (8th Cir. 1992); United States v. Taxe, 540 F.2d 961, 968-69 (9th Cir. 1976) (defendant’s solicitation of attorney to lie about legality of tapes); United States v. Kim, 307 Fed. Appx. 324, 326 (11th Cir. 2009) (statements by CEO to buyers from which CEO’s willful intent and awareness of unlawfulness “reasonably could be inferred”). Prosecuting Intellectual Property Crimes • Actual notice to the defendant that his own conduct was illegal. See, e.g., United States v. Cross, 816 F.2d 297, 300-01 (7th Cir. 1987) (defendant’s sale of pirated videotapes after FBI agents told him that selling and renting unauthorized tapes was illegal). Cease and desist letters from rights owners to the defendant can also be useful in establishing willfulness. • Notice to the defendant that another person’s similar conduct constituted infringement. See United States v. Heilman, 614 F.2d 1133, 1138 (7th Cir. 1980) (defendant’s awareness that government was prosecuting individuals engaged in conduct similar to his own and that conduct had been ruled illegal by four federal and three state courts); United States v. Kim, 307 Fed. Appx. 324 (11th Cir. 2009) (not error for court to find defendant acted willfully where there was evidence that defendant’s cousin, a police officer, had advised his conduct was illegal and defendant had previously been convicted of trademark counterfeiting). • The defendant’s past manufacture and distribution of infringing items. See United States v. Kim, 307 Fed. Appx. 324 (11th Cir. 2009) (not error for court to find defendant acted willfully where defendant had previously been convicted of trademark counterfeiting, and had been advised by police officer relative that his conduct was illegal); United States v. Whetzel, 589 F.2d 707, 712 (D.C. Cir. 1978), abrogated on other grounds, Dowling v. United States, 473 U.S. 207 (1985). • The defendant’s admission to copying, in conjunction with other circumstantial evidence indicating defendant knew copies were unauthorized. United States v. Dadamuratov, 340 Fed. Appx. 540 (11th Cir. 2009) (admission of copying, along with circumstantial evidence of infringement and knowledge, sufficient to prove willful infringement). • The defendant’s statement to Postal Service employee that others were selling illegal DVDs in the area. United States v. Draper, No. 7-05 CR 0004, 2005 WL 2746665, at *2 (W.D. Va. Oct. 24, 2005). • The defendant’s frivolous or bad-faith claim of compliance with copyright laws, which demonstrates knowledge of copyright laws. Cf. United States v. Gardner, 860 F.2d 1391, 1396 (7th Cir. 1988) (holding that when seller of “black boxes” for receiving unauthorized II. Criminal Copyright Infringement 31 cable TV gave buyers a “Notice of Warning” that disclaimed liability for illegal uses, it was “establish[ed] that he was well aware that his actions were unlawful”). • The defendant admission to infringement, but with claim that he believed erroneously that criminal offense required financial gain. In United States v. Dove, No. 2:07CR00015, 2008 WL 3979467 (W.D. Va. Aug. 25, 2008), the defendant admitted to participating in scheme to produce and distribute infringing files online, but claimed he had not made any money in connection with the scheme and that he erroneously believed that infringement was not criminal in the absence of financial gain. The court permitted a “willful blindness” instruction at trial. Conversely, other factors may be relevant to finding an absence of “willfulness”: 32 • Evidence of the defendant’s good-faith belief that his conduct was lawful, coupled with rational attempts to comply with the copyright law as understood by the defendant. Compare United States v. Moran, 757 F. Supp. 1046, 1051-53 (D. Neb. 1991) (court in bench trial finding police officer who operated a “mom-and-pop” video rental business not guilty, because he made single copies of lawfully purchased videos and rented the copies only to prevent vandalism of original tapes, and because his activities were “conducted in such a way as not to maximize profits, which one assumes would have been his purpose if he had acted willfully”) with United States v. Sherman, 576 F.2d 292, 297 (10th Cir. 1978) (affirming conviction of defendants who claimed a good-faith belief that pirated tapes they manufactured and sold were “sound-a-likes,” and thus noninfringing). See also Danjaq, L.L.C. v. Sony Corp., 263 F.3d 942, 959 (9th Cir. 2001) (stating that one who has been notified that his conduct constitutes copyright infringement, but who reasonably and in good faith believes the contrary, has not acted willfully) (citing 4 Nimmer on Copyright § 14.04). • Acting pursuant to legal counsel, even if the advice was erroneous, if the defendant disclosed all relevant circumstances to his attorney and followed the attorney’s advice in good faith. See 4 Nimmer on Copyright § 14.04[B][3][a]; David M. Nissman, Proving Federal Crimes §§ 27.07-.08 (Corpus Juris Publishing 2004). Prosecuting Intellectual Property Crimes Possible alternative charges that require lower mens rea standards are discussed in Section F. of this Chapter. 3. Infringement of the Copyright The next element is that the defendant infringed a copyright. See 17 U.S.C. § 506(a). “Infringement” refers to the violation of one or more of the exclusive rights granted to a copyright owner at 17 U.S.C. § 106. Infringement is implicitly defined in 17 U.S.C. § 501(a): Anyone who violates any of the exclusive rights of the copyright owner as provided by [17 U.S.C. §§ 106-122] or of the author as provided in [17 U.S.C. § 106A(a)], or who imports copies or phonorecords into the United States in violation of [17 U.S.C. § 602], is an infringer of the copyright. Consequently, infringement may include more than violation of the rights enumerated in § 106 (and also include violations of the rights to exclude imports under § 602, or the rights of certain authors to attribution and integrity defined in § 106A(a)), and at the same time, may not extend to all violations of the rights in § 106 (because the rights enumerated in § 106 are “subject to [the limitations of ] §§ 107 through 122”). For purposes of criminal enforcement, however, the relevant types of infringement are those enumerated in § 106. (An author’s rights to attribution and integrity under § 106A(a) are not enforceable criminally. See 18 U.S.C. § 506(f ).) Section 106 of Title 17 sets out the copyright owner’s exclusive rights. These rights consist of the rights “to do and to authorize” the following: • to reproduce a work in copies or phonorecords, § 106(1); • to prepare derivative works, § 106(2); • to distribute copies or phonorecords of the work to the public, § 106(3); • to perform the work publicly (for certain types of works), § 106(4), (6); • to display a work publicly (for certain types of works), § 106(5). Sections 107 through 122 limit these rights, the most notable limitations for criminal enforcement purposes are the public’s right to make “fair use” of a work without authorization, the first sale doctrine, limitations on rental of software and musical sound recordings, and exceptions for installing and backing up software, all of which are discussed in detail in Section C. of this Chapter. II. Criminal Copyright Infringement 33 Felony penalties apply only to infringement of the reproduction or distribution rights. See 17 U.S.C. §§ 506(a), 106(1), (3). Specifically, felony penalties apply only if the infringement involved either “reproduction or distribution” of a minimum number and value of works, see 17 U.S.C. § 506(a)(1)(A) and 18 U.S.C. § 2319(b)(1); 17 U.S.C. § 506(a)(1)(B) and 18 U.S.C. § 2319(c)(1), or if the infringement involved “distribution of a work being prepared for commercial distribution,” by making it available on a publicly-accessible computer network. See 17 U.S.C. § 506(a)(1)(C); 18 U.S.C. § 2319(d)(1). See also Section B.4.c. of this Chapter. Misdemeanor penalties apply to infringement by reproduction or distribution that meet a lower numeric and monetary threshold—one or more copies of one or more copyrighted works, having a total retail value of more than $1,000. See 17 U.S.C. § 506(a)(1)(B), 18 U.S.C. § 2319(c)(3). Misdemeanor penalties also cover willful infringement of any of the exclusive rights under § 106, if committed for commercial advantage or private financial gain. See 17 U.S.C. § 506(a)(1)(A), 18 U.S.C. § 2319(b)(3), and the discussion in Section B.4. of this Chapter. Criminal prosecutions have historically focused on reproduction and distribution because these have generally been the most serious infringements, and these infringements incur the most significant penalties under the current criminal law. However, willful infringement of other exclusive rights may also be sufficiently serious to warrant criminal prosecution, particularly as advances in technology lead greater use of technologies that implicate other exclusive rights, such as the use of Internet “streaming” to disseminate copyrighted material (both legitimately and illegimately). Where appropriate, the Department can and should investigate and prosecute copyright misdemeanors for profitmotivated infringements of other rights, such as public performance, public display, or derivative work. a. Infringement by Reproduction or Distribution Felony penalties are provided for willful infringement committed “by the reproduction or distribution” of ten or more copies (or phonorecords) of one or more copyrighted works, with a total retail value of $2,500 or more. There are actually two separate combinations of statutory provisions that provide felony penalties for this type of conduct. Infringement committed with or without the purpose of commercial advantage or private financial gain can fall under 17 U.S.C. § 506(a)(1)(B) if 34 Prosecuting Intellectual Property Crimes the willful infringement was committed “by the reproduction or distribution, including by electronic means, during any 180-day period, of 1 or more copies or phonorecords of 1 or more copyrighted works, which have a total retail value of more than $1000.” For these offenses, 18 U.S.C. § 2319(c)(1) provides felony penalties “if the offense consists of the reproduction or distribution of 10 or more copies or phonorecords of 1 or more copyrighted works, which have a total retail value of $2,500 or more.” The statutory maximum penalty is 3 years’ imprisonment, 6 for repeat offenders. See § 2319(c). Infringement committed for commercial advantage or private financial gain can also fall under 17 U.S.C. § 506(a)(1)(A), which is a felony if the offense “consists of the reproduction or distribution, including by electronic means, during any 180-day period, of at least 10 copies or phonorecords, of 1 or more copyrighted works, which have a total retail value of more than $2,500.” 18 U.S.C. § 2319(b)(1). The statutory maximum penalty is 5 years’ imprisonment, or 10 for repeat offenders. There is a slight variation in language between the two provisions that set the $2,500 felony threshold: 18 U.S.C. § 2319(c)(1) requires a total retail value of “$2,500 or more,” whereas § 2319(b)(1) requires “more than $2,500.” It is unclear whether this variation was intentional. In addition to the felony penalties discussed in the prior paragraphs, there are also felony penalties in 17 U.S.C. § 506(a)(1)(C) for distribution over a computer network accessible by the public. See Section B.3.b. of this Chapter. The reproduction and distribution rights are set forth in 17 U.S.C. § 106(1) (exclusive right “to reproduce the copyrighted work in copies or phonorecords”) and § 106(3) (exclusive right “to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending”). • Definition of Copies and Phonorecords The term “copies” is often used to refer generically to any material object in which a copyrighted work has been fixed. However, the Copyright Act reserves the term “copies” only for works other than sound recordings. “Copies” are defined as “material objects, other than phonorecords, in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.” 17 U.S.C. § 101. “Phonorecords” are what we think of as copies of sound recordings, and are defined as “material objects II. Criminal Copyright Infringement 35 in which sounds, other than those accompanying a motion picture or other audiovisual work, are fixed by any method now known or later developed, and from which the sounds can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.” Id. Thus, examples of a “phonorecord” would include an audio tape or CD, or an MP3 file. Examples of “copies” would include a book, a painting, a piece of sheet music, or a sculpture. A software program on disc or in a file on a computer, or a movie on DVD or videotape, would also be “copies,” even though these objects might also include an audio sound track. Somewhat confusingly, the terms “copy” and “phonorecord” can also refer to the original object in which the copyrighted work was fixed, such as a handwritten manuscript, or original studio tapes for a sound recording. • “Stealing” Infringement is often referred to as a form of theft. For example, 18 U.S.C. § 2319 is located in a chapter of the criminal code entitled, “Stolen Property.” Yet infringement is distinct from common-law theft, and requires no showing that the defendant “stole” or deprived another person of a physical copy of a work. Making additional copies of a book, movie, or other work may constitute infringement, even if the defendant obtained his original source for additional copies lawfully. Likewise, although publicly distributing copies that were stolen from the copyright owner could constitute infringement, cf. United States v. Chalupnik, 514 F.3d 748 (8th Cir. 2008) (discussing defendant’s criminal copyright conviction for distribution of lawfully-produced CDs taken from post office without authorization), it is not always necessary to show that copies were “stolen” in order to show infringing distribution. i. Reproduction Reproduction encompasses a wide array of conduct, ranging from a novelist’s plagiarizing substantial portions of someone else’s book or a musician’s sampling several notes from a previously-recorded song, to using a computer to “rip” an audio track into MP3 format or making a bit-for-bit copy of a movie on DVD. In most criminal cases, infringing reproduction involves the production of exact, or nearly-exact, duplicates through digital means, as with computer programs, e-books, music or movies copied onto digital media (e.g., CDs, DVDs, hard drives). Copying need not be so blatant, literal, or complete to qualify as infringement, but criminal cases rarely involve defendants who have copied only a small portion of a copyrighted work. Disputes over whether 36 Prosecuting Intellectual Property Crimes songs sound too similar, or whether a movie screenplay copies dialogue or characters from an earlier screenplay, are generally best left to civil lawsuits. Nevertheless, some cases of less-than-wholesale, verbatim copying of an entire work may warrant criminal prosecution. • Proof of Infringement by Reproduction The best evidence of infringement by reproduction is direct evidence that the defendant copied the victim’s work, including, for example eyewitness testimony, emails, or computer logs indicating the copying of particular discs or files. Typically, criminal copyright cases will involve complete, verbatim copying of many copyrighted works, and defendants are generally unlikely to challenge this issue credibly. In fact, defendants often even advertise or otherwise mark the infringing copies as being copies. However, when the copies alleged to be infringing are not essentially identical to the original work, prosecutors may need to prove infringement in greater depth. Direct evidence of copying is best, but circumstantial evidence may suffice. The circumstantial test is whether (1) the defendant had access to the copyrighted work and (2) that defendant’s work is “substantially” or “probatively” similar to the copyrighted material. See Taylor Corp. v. Four Seasons Greetings, LLC, 403 F.3d 958 (8th Cir. 2005); Dam Things from Denmark v. Russ Berrie & Co., 290 F.3d 548, 562 (3d Cir. 2002); Kepner-Tregoe, Inc. v. Leadership Software, Inc., 12 F.3d 527, 532 (5th Cir. 1994). The test of “substantial” or “probative similarity” is whether, considering the two works as a whole, and including both the copyrightable elements and the uncopyrightable ones (such as basic ideas or public-domain expressions that are not eligible for copyright), a reasonable person would conclude that the defendant had actually copied the work from the original. See Positive Black Talk Inc. v. Cash Money Records, Inc., 394 F.3d 357, 370 n.9 (5th Cir. 2004), abrogated on other grounds by Reed Elsevier, Inc. v. Muchnick, 130 S.Ct. 1237 (2010); McCulloch v. Albert E. Price, Inc., 823 F.2d 316, 318-19 (9th Cir. 1987), disagreed with on other grounds, Fogerty v. Fantasy, Inc., 510 U.S. 517 (1994); Atari, Inc. v. North American Philips Consumer Elec. Corp., 672 F.2d 607, 614 (7th Cir. 1982). This standard focuses on the works’ similarities rather than their differences. Cf. United States v. Kim, 307 Fed. Appx. 324 (11th Cir. 2009) (holding comparison of similarities in district court not erroneous, and rejecting defendant’s arguments on appeal that emphasized several differences between infringing copies and originals). Thus, “[i]t is enough that substantial II. Criminal Copyright Infringement 37 parts [of a copyrighted work] were lifted; no plagiarist can excuse the wrong by showing how much of his work he did not pirate.” United States v. O’Reilly, 794 F.2d 613, 615 (11th Cir. 1986) (affirming conviction for infringement of copyright in video games where approximately 70% of defendant’s code was identical to copyrighted original) (quoting Sheldon v. Metro-Goldwyn Pictures Corp., 81 F.2d 49, 56 (2d Cir. 1936) (L. Hand, J.)). Note that this test is designed to determine whether copying occurred, not necessarily whether that copying constituted infringement. If the court determines that actual copying has occurred, only then does it assess whether the copying was substantial enough to constitute infringement. Unfortunately, many courts also refer to this test as one of “substantial similarity,” which can lead to confusion. See, e.g., Sid & Marty Krofft Television Prods., Inc. v. McDonald’s Corp., 562 F.2d 1157, 1164-65 (9th Cir. 1977) (referring to the test of whether copying occurred as an “extrinsic” test of substantial similarity, while calling the test of whether infringement occurred, i.e., whether copyrightable elements were copied, an “intrinsic” test of substantial similarity). To avoid this confusion, many courts prefer to use the term “probative” similarities to show “actual copying,” and “substantial similarity” to show “actionable copying.” See Positive Black Talk Inc., 394 F.3d at 370; Dam Things from Denmark, 290 F.3d at 562 & n. 19. If the copyrighted work and the defendant’s work are “strikingly similar,” the first element of access may be presumed (at least in civil copyright cases), especially when the copyrighted work was widely available. See, e.g., Playboy Enters. v. Frena, 839 F. Supp. 1552, 1556 (M.D. Fla. 1993) (holding proof of access unnecessary when defendant made “essentially exact” copies of copyrighted photos that appeared in nationally-circulated magazine); Bright Tunes Music Corp. v. Harrisongs Music, Ltd., 420 F. Supp. 177 (S.D.N.Y 1976) (access may be presumed when a copyrighted work is widely available) In practice, the government demonstrates “substantial” or “probative” similarity, as well as infringement, by comparing the suspect copy side-byside against an authentic original. Although ideally, this comparison can be performed against the original maintained on file at the Register of Copyrights (if available), it is not absolutely necessary—an authenticated duplicate of the original work will suffice. See O’Reilly, 794 F.2d at 615; United States v. Shabazz, 724 F.2d 1536, 1539 (11th Cir. 1984). Victims may assist the government with these comparisons. See Chapter X of this Manual; cf. United States v. Sherman, 38 Prosecuting Intellectual Property Crimes 576 F.2d 292, 295 (10th Cir. 1978) (mentioning that suspected pirated tapes were checked by record company before search warrant issued). • Statutory Exceptions for Reproduction As noted above, copyright owners’ rights are limited in 17 U.S.C. §§ 107122. Several of these provisions particularly limit the reproduction right, including § 107 (“fair use”), § 108 (certain copying by libraries and archives), § 115 (compulsory license for making phonorecords of musical works), and § 117 (certain limited copying of software). See Section C. of this Chapter. ii. Distribution Section 106(3) of Title 17 grants copyright owners the exclusive right “to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending.” 17 U.S.C. § 106(3). The distribution right is implicated by a wide variety of conduct, such as the sale of books at a bookstore, used CDs at a garage sale, and pirated DVDs at a flea market; the lending of books by a library; and transferring pirated software to other users on the Internet without financial motive. Distribution also includes other transfers of ownership such as gifts or barter. Ford Motor Co. v. Summit Motor Prods., Inc., 930 F.2d 277, 299 (3d Cir. 1991) (citing H.R. Rep. No. 94-1476, at 62, reprinted in 1976 U.S.C.C.A.N. 5659, 5675-76 and 17 U.S.C.A. § 106 (West 1997) (historical note)). Although it is occasionally argued that “distribution” requires the transfer of a physical, tangible copy and therefore that transmission of electronic files online cannot infringe the distribution right, it is clear that the right to “distribute” copies of works includes the right to distribute them in electronic form, and can be infringed by electronic transfers of copies. See, e.g., 17 U.S.C. § 506(a)(1)(C) (defining offense for “distribution” of pre-release works on a public computer network); N.Y. Times Co. v. Tasini, 533 U.S. 483, 498 (2001) (discussing distribution of articles through online databases). • “To the Public” Although often referred to merely as “distribution,” the right protected by § 106 is, more specifically, the right to distribute copies or phonorecords of the work “to the public.” 17 U.S.C. § 106(3) (emphasis added). Giving a single copy of a work to a family member or close friend may not qualify as a “distribution” for copyright purposes, although courts have found under some circumstances that even the giving of a single copy to one person may constitute “distribution II. Criminal Copyright Infringement 39 to the public.” Ford Motor Co., 930 F.2d at 299-300. But see Cartoon Network LP, LLLP v. CSC Holdings, Inc., 536 F.3d 121 (2d Cir. 2008) (concluding that cable television service’s “remote DVR” system, wherein a copy of a program was transmitted to an individual customer after being recorded at customer’s request, did not constitute distribution “to the public” for purposes of § 106). The Copyright Act does not expressly define “distribution” or “public,” except through definitions of other closely-related terms. The term “publication” is defined in § 101, and is often used interchangeably with distribution, and several courts have noted that the two terms are “for all practical purposes synonymous” in the context of a first publication. Ford Motor Co., 930 F.2d at 299; see also Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 552 (1985); Agee v. Paramount Comm’ns, Inc., 59 F.3d 317, 325 (2d Cir. 1995); Elektra Entm’t Group, Inc. v. Barker, 551 F. Supp. 2d 234, 240-43 (S.D.N.Y. 2008); 2 Nimmer on Copyright § 8.11[A], at 8-148 to 8-149. Some courts have held, however, that “[i]t is not clear that the terms ‘publication’ and ‘distribution’ are synonymous outside the context of first publication.” Atlantic Recording Corp. v. Howell, 554 F. Supp. 2d 976, 984 (D. Ariz. 2008) (“the definition of publication in § 101 of the statute makes clear that all distributions to the public are publications, but it does not state that all publications are distributions”); London-Sire Records, Inc. v. Doe 1, 542 F. Supp. 2d 153, 168-69 (D. Mass. 2008) (“even a cursory examination of the statute suggests that the terms are not synonymous.... By the plain meaning of the statute, all ‘distributions ... to the public’ are publications. But not all publications are distributions to the public”). Section 101 also defines the term “publicly,” with respect to performances and display of works, as referring to “place[s] open to the public or any place where a substantial number of persons outside of a normal circle of a family and its social acquaintances is gathered.” For cases discussing distribution “to the public” in several contexts, such as computer networks and subscription based services, see Section B.3.c.ii. of this Chapter. • Importation Infringing articles are often manufactured overseas and then shipped into the United States for distribution. Under 17 U.S.C. § 602, importation of infringing copies into the United States without permission of the copyright owner generally constitutes “an infringement of the exclusive right to distribute 40 Prosecuting Intellectual Property Crimes copies or phonorecords under section 106.” Although § 602 specifies that unauthorized importation is a violation of the distribution right (thus providing a basis for criminal prosecution under § 506), and states further than unauthorized importation is “actionable under section 501,” § 602 does not expressly mention criminal actions under § 506. To date, no reported case has prohibited prosecutors from bringing an action pursuant to § 506 as a result of a violation of 17 U.S.C. § 602. However, in cases involving importation, prosecutors alternatively should consider charging the defendant with bringing goods into the United States by false statements, 18 U.S.C. § 542, or with smuggling goods, 18 U.S.C. § 545. • Making Works Available on the Internet Without Transferring Them In the context of peer-to-peer (“P2P”) file-sharing networks, placing materials on a website, or other similar methods by which copyrighted materials might be downloaded online, a question may arise as to whether a defendant who merely makes copyrighted material available to others to download copies has infringed the distribution right, in the absence of any evidence of an actual transfer of infringing works. If a P2P user has made movies, music, or software available to the public by placing them in a shared area of his networked desktop computer, but his computer contained no records of whether or how many times these files were downloaded by others, and there is no other evidence that the copyrighted works the defendant “made available” were actually transferred to another computer (or indeed, if there is evidence that no such transfers actually occurred, despite the defendant’s having made the files available), has the defendant nevertheless infringed the distribution right in the works (setting aside for the moment the question of whether the defendant may have infringed the reproduction right by copying the files in the first place, or whether the defendant may be infringing the public performance or display rights in the work)? There is no clear answer, however, as described more below, courts will likely require proof of at least some form of dissemination to have occurred in order to find a defendant guilty of a criminal violation of the distribution right. Several civil cases addressing online infringement suggest that the distribution right is infringed at the point when the defendant makes a file publicly available. See A&M Records v. Napster, Inc., 239 F.3d 1004, 1014 (9th Cir. 2001) (noting that “Napster users who upload file names to the search index for others to copy violate plaintiffs’ distribution rights. Napster users who II. Criminal Copyright Infringement 41 download files containing copyrighted music violate plaintiffs’ reproduction rights.”); Motown Record Co., LP v. DePietro, No. 04-CV-2246, 2007 WL 576284, at *3 n.38 (E.D. Pa. Feb. 16, 2007) (“While neither the United States Supreme Court nor the Third Circuit Court of Appeals has confirmed a copyright holder’s exclusive right to make the work available, the Court is convinced that 17 U.S.C. § 106 encompasses such a right ....”); Elektra Entm’t Group, Inc. v. Doe, No. 5:08-CV-115-FL, 2008 WL 5111885 (E.D.N.C., Sept. 26, 2008); Warner Bros. Records, Inc. v. Doe, No. 5:08-CV-116-FL, 2008 WL 5111884 (E.D.N.C., Sept. 26, 2008); see also Playboy Enters. v. Chuckleberry Publ’g, Inc., 939 F. Supp. 1032, 1039 (S.D.N.Y. 1996) (uploading content on Internet and inviting users to download it violates exclusive publication right); Playboy Enters. v. Russ Hardenburgh, Inc., 982 F. Supp. 503, 513 (N.D. Ohio 1997) (“Defendants disseminated unlawful copies of PEI photographs to the public by adopting a policy in which RNE employees moved those copies to the generally available files instead of discarding them.”); Getaped.Com, Inc. v. Cangemi, 188 F. Supp. 2d 398, 402 (S.D.N.Y. 2002) (holding that copyrighted material was published when it was placed on website and available for viewing or downloading). A case frequently cited for the proposition that “making available” violates the distribution right is Hotaling v. Church of Jesus Christ of Latter-Day Saints, 118 F.3d 199 (4th Cir. 1997). At issue in Hotaling was whether a church library open to the public had distributed the plaintiff’s work by having it in its collection and listing it in its card catalog, even though no evidence indicated that the work had actually been borrowed or viewed by library patrons. The defendant argued that holding the work in its collection constituted a mere offer to distribute, at most, not an actual distribution. The court sided with the plaintiffs: When a public library adds a work to its collection, lists the work in its index or catalog system, and makes the work available to the borrowing or browsing public, it has completed all the steps necessary for distribution to the public. At that point, members of the public can visit the library and use the work. Were this not to be considered distribution within the meaning of § 106(3), a copyright holder would be prejudiced by a library that does not keep records of public use, and the library would unjustly profit by its own omission. 42 Prosecuting Intellectual Property Crimes Id. at 203. At least one court considering Hotaling focused on the opinion’s concern with potential prejudice from a library that kept no records, and suggested that the same logic might apply in online cases where no records are kept. In Arista Records, Inc. v. MP3Board, Inc., No. 00CIV.4660(SHS), 2002 WL 1997918, at *4 (S.D.N.Y. Aug. 29, 2002) (citing Hotaling, 118 F.3d at 204), the court considered that “a copyright holder may not be required to prove particular instances of use by the public when the proof is impossible to produce because the infringer has not kept records of public use,” but declined to find that an actual distribution had occurred based on the facts before it (in which investigators for the record industry had determined only that hyperlinks on the defendant’s website pointed to infringing audio files). Id. Many other courts have sought to resolve peer-to-peer lawsuits while avoiding resolution of “making available” arguments. See, e.g., Arista Records LLC v. Gruebel, 453 F. Supp. 2d 961, 969 (N.D. Tex. 2006) (“[M]aking copyrighted works available to others may constitute infringement by distribution in certain circumstances.”); Maverick Recording Co. v. Goldshteyn, No. 05-CV-4523, 2006 WL 2166870, at *3 (E.D.N.Y. July 31, 2006) (Plaintiff’s “‘making available’ argument need not be decided here.”); Fonovisa, Inc. v. Alvarez, No. 1:06-CV011, 2006 WL 5865272, at *2 (N.D. Tex. July 24, 2006) (“This Court is not making a determination as to whether ‘making works available’ violates the right of distribution.”). The Copyright Office states that U.S. copyright law includes a “making available” right that covers making files available on the Internet. See U.S. Copyright Office, DMCA Section 104 Report, Vol. 1, at 93-95 (August 2001) available at http://www.copyright.gov/reports/studies/dmca/sec-104-reportvol-1.pdf. This, however, does not necessarily resolve the issue for criminal cases because the Copyright Office characterizes this “making available right” as resulting from a combination of the distribution, reproduction, public display, and public performance rights. Id. at 94. Because the felony copyright provisions apply only to infringement of the distribution and reproduction rights, it is unclear whether “making available” (as the Copyright Office interprets it) can support a felony charge. More recently, however, most courts confronting the “making available” issue in civil cases involving either peer-to-peer filesharing or other online contexts have determined that infringing “distribution” requires the dissemination of an actual copy, or have at least expressed some skepticism that mere “making available” is sufficient to constitute infringement. See Perfect 10, II. Criminal Copyright Infringement 43 Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1162 (9th Cir. 2007) (distribution requires actual dissemination of a copy); Capitol Records, Inc. v. Thomas, 579 F. Supp. 2d 1210, 1218-19 (D. Minn. 2008) (plain meaning of “distribution” requires actual dissemination and does not include merely making available); Elektra v. Barker, supra, 551 F. Supp. 2d 234 (S.D.N.Y. 2008) (mere allegation of “making available” not sufficient to plead infringement, although noting that an offer to distribute copies for further distribution to others would be sufficient); London-Sire Records, Inc. v. Doe 1, 542 F. Supp. 2d 153, 168-69 (D. Mass. 2008) (“Merely because the defendant has ‘completed all the steps necessary for distribution’ does not necessarily mean that a distribution has actually occurred.”); see also Atlantic Recording Corp. v. Brennan, 534 F. Supp. 2d 278, 282 (D. Conn. Feb 13, 2008) (denying plaintiffs’ entry of default against defendant, in part, by finding that defendant may have a meritorious defense against plaintiffs’ “problematic” make available argument); Atlantic Recording Corp. v. Howell, 554 F. Supp. 2d 976, 981 (D. Ariz. 2008). A number of other federal courts have held that distribution requires that an infringing copy actually be disseminated. See Obolensky v. G.P. Putnam’s Sons, 628 F. Supp. 1552, 1555 (S.D.N.Y. 1986) (directing verdict for defendants after jury trial because the right to distribute is not violated “where the defendant offers to sell copyrighted materials but does not consummate a sale” or “where there is copying, but no sale of the material copied”), aff’d, 795 F.2d 1005 (2d Cir. 1986); accord Paramount Pictures Corp. v. Labus, No. 89-C-797-C, 1990 WL 120642, at *4 (W.D. Wis. Mar. 23, 1990); National Car Rental Sys., Inc. v. Computer Assocs. Int’l, Inc., 991 F.2d 426, 430 (8th Cir. 1993) (holding that distribution requires the transfer of an actual copy, as § 106(3) grants the copyright owner the “exclusive right publicly to sell, give away, rent or lend any material embodiment of his work”) (quoting 2 Nimmer on Copyright § 8.11[A], at 8-123 (emphasis added by National Car Rental)); cf. In re: Aimster Copyright Litig., 252 F. Supp. 2d 634, 643 (N.D. Ill. 2002) (noting, without analysis, that a peer-to-peer user “with copyrighted music files on his hard drive available for download can [once another user searches for and locates a file on the first user’s computer] thereafter become an unauthorized distributor of that copyrighted music as soon as another Aimster user initiates a transfer of that file.”), aff’d, 334 F.3d 693 (7th Cir. 2003). The leading copyright treatise also supports this view. See 2 Nimmer on Copyright § 8.11[A], at 8-124.1 (“Infringement of [the right to distribute] requires an actual dissemination of either copies or phonorecords.”). 44 Prosecuting Intellectual Property Crimes Only one criminal decision has addressed this question, albeit in the context of deciding whether state court charges were preempted by federal copyright law: “Posting software on a bulletin board where others can access and download it is distribution ... which is governed by the [federal] copyright laws.” State v. Perry, 697 N.E.2d 624, 628 (Ohio 1998). In 2005, Congress created a new offense for infringement of “pre-release” content (see infra, Sec. B.3.c.) that unfortunately does not appear to have resolved the “making available” issue. Section 506(a)(1)(C) makes it a felony to willfully infringe “by the distribution of [a pre-release work] by making it available on a computer network accessible to members of the public ....” To date, few courts have had the opportunity to address what “making available” means in the context of § 506(a)(1)(C). Thus far, the only published opinion to discuss the issue is In re Napster, Inc. Copyright Litig., 377 F. Supp. 2d 796 (N.D. Cal. 2005). In that opinion, the court considered the plaintiffs’ motion for summary judgment on their claims that Napster had directly infringed the plaintiffs’ copyrights by creating and maintaining an indexing system that allowed users to upload and download infringing music files. Id. at 802. The key question was “whether the Copyright Act requires proof of the actual dissemination of a copy or phonorecord in order to establish the unlawful distribution of a copyrighted work in violation of 17 U.S.C. § 106(3).” Id. The court concluded that distribution did not include the mere offer to distribute a copyrighted work, given the plain meaning and legislative history of the terms “distribution” and “publication.” See id. at 803-04. The court concluded that “to the extent that Hotaling suggests that a mere offer to distribute a copyrighted work gives rise to liability under section 106(3), that view is contrary to the weight of [the] above-cited authorities.” Id. at 803 (citations omitted). Finally, the court rejected the argument that the “making available” language in the new offense at 17 U.S.C. § 506(a)(1)(C), discussed in Section B.3.c.ii. of this Chapter, evinced Congress’s intent that “making available” was a type of distribution, concluding that § 506(a)(1)(C) made willful copyright infringement and “making available” two separate elements. Napster, 377 F. Supp. 2d at 805. Given this backdrop, courts deciding criminal cases are likely to require proof of actual dissemination of copies, as opposed to evidence that the defendant merely “made [infringing works] available,” if only to satisfy the rule of lenity. See United States v. Wiltberger, 18 U.S. 76, 95 (1820); Dowling v. United States, 473 U.S. 207, 213, 228-29 (1985) (applying rule of lenity to II. Criminal Copyright Infringement 45 construe stolen property laws narrowly in light of copyright law). Moreover, courts might consider Congress’s choice not to punish attempts in § 506 as further evidence that distribution, in criminal cases, requires an actual transfer of an infringing copy to the public. Some of the civil cases in which proof of actual dissemination has not been required suggest an alternative rule—that where, due to the defendant’s actions, no records exist of actual transfers, the court may infer or presume that actual dissemination took place. See Hotaling, 118 F.3d 199; Arista Records, 2002 WL 1997918. That rule, however, might not be adopted in criminal cases, in which infringing distribution must be proven beyond a reasonable doubt. As a practical matter, evidence of actual infringing transfers strengthens other aspects of the case. Even if a theory of distribution without dissemination were accepted by the court, a jury might nevertheless reject it—either in sympathy toward a defendant who ostensibly copied nothing, or by concluding that the defendant could not have understood that his conduct constituted infringement sufficiently to establish willful behavior. See the discussion of willfulness in Section B.2. of this Chapter. When proving that the defendant actually distributed infringing copies, distributions to law enforcement officers or to agents working for the victim should suffice, as a matter of law. See Capitol Records Capitol Records, Inc. v. Thomas, 579 F. Supp. 2d 1210, 1216 (D. Minn. 2008) (distribution of copies to investigator can form the basis for civil claim of infringing distribution right); Atlantic Recording Corp. v. Howell, 554 F. Supp. 2d 976, 985 (D. Ariz. 2008) (holding that 12 infringing copies downloaded by copyright owner’s investigators constituted unauthorized distributions); Gamma Audio & Video, Inc. v. Ean-Chea, No. 91-11615-Z, 1992 WL 168186 at *3 n.5 (D. Mass. July 3, 1992), rev’d in part on other grounds, 11 F.3d 1106 (1st Cir. 1993); Paramount Pictures, 1990 WL 120642 at *5. But see London-Sire Records, Inc., 542 F. Supp. 2d at 166 (stating in dicta that copyright holder’s investigator’s “own downloads are not themselves copyright infringements because it is acting as an agent of the copyright holder, and copyright holders cannot infringe their own rights”). In some cases, a defendant may have evinced a clear intent to share copyrighted content online in an infringing manner, but sufficient evidence of specific instances of dissemination may be difficult or impossible to obtain. Prosecutors should consider whether the conduct at issue may be appropriately characterized as an infringement of the reproduction right. Further, although attempts to violate § 506 are not criminalized, in appropriate cases a charge 46 Prosecuting Intellectual Property Crimes of conspiracy to violate § 506 may be an alternative option. The government need not prove an actual dissemination if the charge is conspiracy to violate the criminal copyright laws by means of distribution. That is, because conspiracy is an inchoate crime, the government need not prove that the underlying crime of distribution was completed. • First Sale Under 17 U.S.C. § 109, it is not an infringement for the owner of a lawfully-acquired copy or phonorecord of a work to sell or otherwise dispose of that particular copy. This exception is often referred to as the “first-sale” doctrine. For example, a person who purchases a book at a bookstore may later resell the book at a yard sale or donate it to a library, without the copyrightholder’s permission. Although first sale is treated as a defense in civil cases, some criminal copyright cases have held that the government must plead and prove the absence of a first sale as an element of the offense. See Section C.4.c. of this Chapter. b. Infringement of at Least 10 Copies of 1 or More Copyrighted Works With a Total Retail Value Exceeding $2,500 Within a 180-Day Period i. Generally The final element for felony offenses under 17 U.S.C. § 506(a)(1)(A) and (B) is that the infringement consisted of the “reproduction or distribution, including by electronic means, during any 180-day period, of at least 10 copies or phonorecords, of 1 or more copyrighted works, which have a total retail value of more than $2,500.” 18 U.S.C. § 2319(b)(1); see also 18 U.S.C. § 2319(c)(1) (alternative felony provision, applying when value is “$2,500 or more”). For definition of “copies” and “phonorecords,” see Section B.3.a. of this Chapter (discussing 17 U.S.C. § 101). Congress reserved felony penalties for those who copy or distribute a minimum of 10 copies to exclude from felony prosecution low-level infringement such as “children making copies for friends as well as other incidental copying of copyrighted works having a relatively low retail value,” and also to avoid having the criminal provisions used as a “tool of harassment” in business disputes involving issues such as reverse engineering or the scope of licenses. H.R. Rep. No. 102-997, at 6 (1992), reprinted in 1992 U.S.C.C.A.N. 3569, 3574. II. Criminal Copyright Infringement 47 Congress used the phrase “of one or more copyrighted works” as a way “to permit aggregation of different works of authorship to meet the required number of copies and retail value.” Id. Congress gave as an example a defendant who reproduces 5 copies of a copyrighted word-processing computer program with a retail value of $1,300 and 5 copies of a copyrighted spreadsheet computer program also with a retail value of $1,300. Aggregating these reproductions “would satisfy the requirement of reproducing 10 copies having a retail value of at least $2,500, if done within a 180-day period.” Id. ii. Definition of “Retail Value” as an Element of the Offense Congress left the term “retail value” “deliberately undefined since in most cases it will represent the price at which the work is sold through normal retail channels.” Id. Based on both the plain meaning of the statutory text and the legislative history of the 1992 Copyright Felony Act, the term “retail value” as used in 17 U.S.C. § 506 and 18 U.S.C. § 2319 refers to the retail value of the infringed item, i.e., the original or genuine item that was infringed, in the market in which it is sold. By contrast, for sentencing purposes, the Sentencing Guidelines defines “retail value” to include either the value of the “infringed item” (the authentic item) or the “infringing item”(the “street” price of a pirated or counterfeit copy) to compute the sentencing offense level, depending on the circumstances of the crime. See the discussion of U.S.S.G. § 2B5.3 cmt. n.2(C) in Section C.1.c.iii. of Chapter VIII of this Manual. For purposes of proving the dollar value element of criminal infringement under 17 U.S.C. § 506(a)(1) and 18 U.S.C. § 2319(b) or (c), “retail value” means the retail price of a legitimate or genuine copy of the item infringed at the time of the defendant’s infringement. See United States v. Armstead, 524 F.3d 442, 443 (4th Cir. 2008) (holding that retail value can be “determined by taking the highest of the ‘face value,’ ‘par value,’ or ‘market value’ of copies of the copyrighted material in a retail context”). Calculating a work’s retail value can be more complicated when the work has been published in multiple versions—which often occurs with computer software. In civil cases involving infringement of a new version of a software program that had not yet been registered with the Copyright Office, where earlier versions had been registered, some courts have allowed damages only to the extent that the infringed material consists of material from the earlier, registered versions. See, e.g., Montgomery v. Noga, 168 F.3d 1282, 1292 (11th Cir. 1999); Well-Made Toy Mfg. Corp. v. 48 Prosecuting Intellectual Property Crimes Goffa Int’l Corp., 210 F. Supp. 2d 147, 158 (E.D.N.Y. 2002); 2 Nimmer on Copyright § 7.16[B][2]. But see Montgomery, 168 F.3d at 1294-95 (upholding jury instruction that permitted the jury to calculate the plaintiff’s actual damages by considering the market value of newer, unregistered version). Although the issue of multiple versions presents more significant challenges in the civil context, where registration of the copyright in a particular work is a prerequisite to filing a lawsuit for infringement of that work, the existence of multiple versions can substantially affect the “retail value” of a work for purposes of criminal prosecution as well. For example, where the most recent version of a business software program (“Program 2.0”) is being sold through legitimate retail outlets for $200, while legitimate copies of an older version (“Program 1.0”) are still being sold, albeit for the lower retail price of $100, a defendant who pirated 20 copies of the new version would be subject to felony penalties (20 copies at $200 each, totaling $4,000), while a defendant who reproduced 20 pirated copies of the older version would only meet the threshold for a misdemeanor (20 X $100= $2,000). In considering whether and how to charge criminal copyright infringement, prosecutors will want to make sure to assess charges based on the specific version of a copyrighted work that was infringed, and if possible, to obtain retail pricing information on the specific version infringed during the relevant period of the defendant’s conduct. iii. Retail Value for Pre-release Works Prosecutors may choose to include pre-release works in charges brought under 17 U.S.C. § 506(a)(1)(A), (B) and 18 U.S.C. § 2319(b), (c), where, for example, the defendant engaged in criminal infringement of both pre-release and non-pre-release works, or where other elements of the “pre-release” offense may be difficult to prove. Determining the “retail value” of a pre-release work can be challenging because such works, by definition, are not yet sold on the legitimate market, and thus their legitimate retail value may not yet be set. Congress acknowledged the problem and offered several solutions: At the same time, the Committee recognizes that copyrighted works are frequently infringed before a retail value has been established, and that in some cases, copyrighted works are not marketed through normal retail channels. Examples include motion pictures [sic] prints distributed only for theatrical release, and beta-test versions of computer programs. In such cases, the courts may look to the suggested retail price, the wholesale II. Criminal Copyright Infringement 49 price, the replacement cost of the item, or financial injury caused to the copyright owner. H.R. Rep. No. 102-997, at 6-7 (1992) (emphasis added), reprinted in 1992 U.S.C.C.A.N. 3569, 3574-75. If the infringed item has no retail value, the important consideration is the harm to the copyright owner, rather than the (presumably smaller value of ) profits to the infringer. See id. at 6; 138 Cong. Rec. 34,371 (1992) (statement of Sen. Hatch). Although the Family Entertainment and Copyright Act (“FECA”) created a new felony offense to address Internet piracy of “work[s] being prepared for commercial distribution,” the Act does not specify a particular method for determining the “retail value” of such works. See Pub. L. No. 109-9 § 103, 119 Stat 218, 220-21 (2005) (codified at 17 U.S.C. § 506(a)(1)(C)). (One possible reason: the “pre-release” offense created by the FECA requires no minimum number or value of infringing copies, in contrast to the 10-copy, $2500 thresholds in previously-existing copyright felonies. Compare 17 U.S.C. § 506(a)(1)(C) with 17 U.S.C. § 506(a)(1)(A), (B) and 18 U.S.C. § 2319. The FECA “pre-release” offense is discussed in more detail in Section B.3.c., below.) In cases where infringement of pre-release works form the basis of a § 506(a)(1)(A) or (B) charge, requiring proof of a minimum “total retail value,” prosecutors should consider the alternative methods for valuation discussed in the legislative history above. Also instructive is the approach taken by the U.S. Sentencing Commission in formulating Sentencing Guidelines amendments to address the FECA “pre-release” offense. Those guidelines specify that prerelease works should be valued, for sentencing purposes, at the anticipated retail value of legitimate works upon their legitimate commercial release. See U.S.S.G. § 2B5.3 cmt. n.2(A)(vi) (amended Oct. 24, 2005). (The Guidelines also include a 2-level enhancement for offenses involving pre-release works. See id. § 2B5.3(b)(2); and Section C.1.c.iii. of Chapter VIII of this Manual.) Where the basis for a § 506(a)(1)(A) or (B) charge consists of a mixture of pre-release and non-pre-release works, the safest course for prosecutors may be to ensure that the $2500 threshold can be demonstrated based on the value of non-pre-release works alone. iv. $2,500 Threshold To charge a criminal copyright violation as a felony in cases not involving a “pre-release” offense, the government must prove that the total retail value of the infringing copies exceeded $2,500. This threshold has one minor 50 Prosecuting Intellectual Property Crimes complication: the felony threshold is “more than $2,500” when the defendant acted with a profit motive, 18 U.S.C. § 2319(b)(1), but only “$2,500 or more” when the defendant acted without a profit motive, 18 U.S.C. § 2319(c)(1). To be safe, each felony indictment should charge a value greater than $2,500. v. Within 180 Days These technical requirements are sometimes difficult to prove. For example, if a defendant operated a video store that rented only pirated videos, but kept no records that describe who did what and at what time, it might be difficult to prove that the defendant himself reproduced or distributed the videos, or that he did so within a particular 180-day period. If faced with such a case, the government may wish to consider alternative charges—such as conspiracy to commit felony criminal copyright infringement; misdemeanor copyright infringement (which reduces the number of copies to 1 and the retail value threshold to $1,000; see Section B.5. of this Chapter); 18 U.S.C. § 2318 (counterfeit or illicit labels, documentation, or packaging for copyrighted works); or 18 U.S.C. § 2320 (trafficking in goods, services, labels, documentation, or packaging with counterfeit marks)—that have no numerical or monetary thresholds. Section 2320 also has the advantage of punishing attempts, which can be proved when the government lacks records of the completed crime c. Distribution of a Work Being Prepared for Commercial Distribution, by Making it Available on a Publicly-Accessible Computer Network, if the Defendant Knew or Should Have Known the Work Was Intended for Commercial Distribution In 2005, Congress added an additional felony offense to address the online infringement of pre-release works. See Family Entertainment and Copyright Act of 2005 (FECA), Pub. L. No. 109-9 § 103 (codified at 17 U.S.C. § 506(a) (1)(C)). (This provision is part of Title I of FECA, also known as the “Artists Rights and Theft Prevention Act of 2005” or the “ART Act.”) Congress enacted this provision to target two phenomena that it deemed particularly harmful to copyright-holders, especially in combination—“pre-release” piracy and Internet piracy (especially peer-to-peer file-sharing). See, e.g., Remarks on Introduction of Bill in Senate, 151 Cong. Rec. S494 (daily ed. Jan. 25, 2005); Judiciary Committee Report, H.R. Rep. No. 109-33(I), at 4 (2005), reprinted in 2005 U.S.C.C.A.N. 220, 223. Section 506(a)(1)(C) makes it a felony to willfully infringe “[i] by the distribution of [ii] a work being prepared for commercial distribution, [iii] by making it available on a computer network accessible to II. Criminal Copyright Infringement 51 members of the public, [iv] if such person knew or should have known that the work was intended for commercial distribution.” 17 U.S.C. § 506(a)(1)(C) (small Roman numerals added for purposes of illustration). The new offense eliminates the monetary and numeric thresholds for felony copyright infringement if the defendant distributed pre-release works on a computer network. i. Distribution The offense defined under 17 U.S.C. § 506(a)(1)(C) applies only to infringement by distribution (as opposed to the copyright felonies in 17 U.S.C. § 506(a)(1)(A),(B) that apply to infringement by distribution or reproduction). For discussion of proving distribution, see Section B.3.a.ii. of this Chapter. Section 506(a)(1)(C)’s use of the term “making available” does not resolve the issue of whether “distribution” requires an actual dissemination of infringing copies. As of this writing, the only reported case that has discussed this issue specifically in the context of § 506(a)(1)(C), a civil copyright case, stated that “distribution” and “making available on a computer network” are two separate elements of the § 506(a)(1)(C) offense. See In re Napster, Inc. Copyright Litig., 377 F. Supp. 2d 796, 805 (N.D. Cal. 2005). The inclusion of “making available” did not, according to this court, redefine distribution to include making available. See Section B.3.a.ii and the following Section of this Chapter. Regardless of whether “distribution” legally requires actual dissemination of copies, or is interpreted to include merely offers to provide copies, as a practical matter, evidence of actual dissemination of pre-release copies will generally strengthen the government’s case, and should be presented if possible. ii. Making the Work Available on a Computer Network Accessible to Members of the Public The next element is “making [the work] available on a computer network accessible to members of the public.” See 17 U.S.C. § 506(a)(1)(C). Although the statute does not define “computer network” or “accessible to members of the public,” the bill was clearly intended to address piracy over the Internet. See H.R. Rep. No. 109-33(I), reprinted in 2005 U.S.C.C.A.N. 220; 151 Cong. Rec. S499-500 (daily ed. Jan. 25, 2005) (statement of Sen. Cornyn). Clear examples of “making the work available on a computer network 52 Prosecuting Intellectual Property Crimes accessible to members of the public” would include posting the work on a website or placing it in a desktop computer’s shared file directory so that peerto-peer users around the world could access and download it. “[A] computer network accessible to the public” should be read to include large networks available to substantial numbers of people, even if the network is not immediately accessible to all members of the public, such as a university’s campus-wide network, a large but proprietary service like AOL, or a passwordprotected site on the Internet. This would be consistent with the right at issue (“distribution to the public”), and the statutory definition of “publicly” in the context of displays and performances, which refers to “any place where a substantial number of persons outside of a normal circle of a family and its social acquaintances is gathered.” See 17 U.S.C. § 101; Playboy Enters., Inc. v. Frena, 839 F. Supp. 1552, 1557 (M.D. Fla. 1993) (holding that displaying infringing photographs over a computer bulletin board to audience limited to paying subscribers constituted display “to the public”); accord Video Pipeline, Inc. v. Buena Vista Home Entm’t, Inc., 192 F. Supp. 2d 321, 332 (D.N.J. 2002), aff’d on other grounds, 342 F.3d 191 (3d Cir. 2003); Video Pipeline, Inc. v. Buena Vista Home Entm’t, Inc., 275 F. Supp. 2d 543, 554 (D.N.J. 2003). See also Section B.3.a.ii. of this Chapter (discussing “to the public”). But cf. Andersen Consulting LLP v. UOP, 991 F. Supp. 1041, 1042-43 (N.D. Ill. 1998) (discussing meaning of electronic communications service “to the public” under the Electronic Communications Privacy Act); Konop v. Hawaiian Airlines, Inc., 302 F.3d 868, 875 (9th Cir. 2002) (same). iii. Work Being Prepared for Commercial Distribution The next element of an offense under § 506(a)(1)(C) is that the infringed work must be a “work being prepared for commercial distribution,” which is defined as: (A) a computer program, a musical work, a motion picture or other audiovisual work, or a sound recording, if, at the time of unauthorized distribution-(i) the copyright owner has a reasonable expectation of commercial distribution; and (ii) the copies or phonorecords of the work have not been commercially distributed; or II. Criminal Copyright Infringement 53 (B) a motion picture, if, at the time of unauthorized distribution, the motion picture-(i) has been made available for viewing in a motion picture exhibition facility; and (ii) has not been made available in copies for sale to the general public in the United States in a format intended to permit viewing outside a motion picture exhibition facility. 17 U.S.C. § 506(a)(3). Thus, the definition includes only four types of works: software, musical works, audiovisual works such as movies, and sound recordings. Although these categories make up most of the works pirated online, other types that could also be infringed online—such as books, photographs and other works of visual art—are not included. When Congress created these provisions, it also created a “preregistration” process allowing owners to “preregister” their “works being prepared for commercial distribution” with the Copyright Office. See 17 U.S.C. § 408(f ); 37 C.F.R. § 202.16 (effective July 2, 2008); Section B.1.c. of this Chapter (discussing preregistration). However, prosecutors should be aware that the scope of the term “works being prepared for commercial distribution” is narrower for purposes of the criminal offense under § 506(a)(1)(C) than the scope that term was given by the Copyright Office in its preregistration regulations. First, the Copyright Office’s regulations cover not only movies, music, and software, but also literary works and advertising or marketing photographs. See 37 C.F.R. § 202.16. This is broader than the four classes specified by 17 U.S.C. § 506(a)(3), and therefore some works the Copyright Office considers “works being prepared for commercial distribution” may not qualify as “works being prepared for commercial distribution” for purposes of the criminal “pre-release” offense. Second, the Copyright Office allows for the preregistration of a work that is in the early stages of development: for example, for motion pictures, filming must have commenced, and for a computer program, at least some of the computer code must have been fixed. See 37 C.F.R. § 202.16(b)(2). Although these standards may suffice for preregistration with the Copyright Office, prosecutors should exercise caution in evaluating whether to pursue charges based on works that are substantially incomplete. Cases involving a mere fragment of a work or a substantially incomplete work are more likely to 54 Prosecuting Intellectual Property Crimes face difficulties in proving copyrightability and infringement, as well as proving “retail value” and perhaps willfulness as well. Although the pre-release offense and the preregistration process were enacted at the same time, the plain language of 17 U.S.C. § 506(a)(1)(C) does not require that the “work being prepared for commercial distribution” be preregistered before an infringer can be prosecuted. Nor does the legislative history indicate that Congress intended § 506(a)(1)(C) to apply only to “preregistered” works. Therefore, the FECA amendments did not alter the government’s power to prosecute infringement that occurs before preregistration or registration of a work. See also 17 U.S.C. § 411 (registration only required to commence civil action). iv. The Defendant Knew or Should Have Known that the Work Was Intended for Commercial Distribution The next element in § 506(a)(1)(C) concerning the defendant’s awareness that the work was “being prepared for commercial distribution,” has a lower mens rea than the other elements of the offense, which require proof of “willfulness.” For this element, the government does not have to prove that a defendant had actual knowledge that the infringed work was a pre-release work, but rather, the government need only show that the defendant “knew or should have known” that the work was “intended for commercial distribution,” which is essentially a negligence standard. 4. Additional Element for Enhanced Sentence: Purpose of Commercial Advantage or Private Financial Gain Proving that the defendant acted “for purposes of commercial advantage or private financial gain” is often either a primary element of an IP crime or a secondary element that can enhance the defendant’s maximum sentence. These issues are covered in Sections B. of this Chapter (setting out elements) and C.1.f. (sentencing factors) of Chapter VIII this Manual. a. History Before 1997, U.S. law required the government to prove the defendant’s intent to seek commercial advantage or private financial gain in every criminal copyright prosecution. In United States v. LaMacchia, 871 F. Supp. 535, 53940 (D. Mass. 1994), the defendant had operated an internet site that invited users to upload and download pirated software. Presumably recognizing, as the II. Criminal Copyright Infringement 55 district court later noted, that the defendant could not have been charged with criminal copyright infringement because he had operated his Internet site for trading pirated works without a profit motive, the government instead charged LaMacchia with wire fraud. The court dismissed that charge, suggesting that applying the broad wire fraud statute to copyright infringement could “subvert the carefully calculated penalties” and the “carefully considered approach” Congress had taken in the area of copyright. Id. at 539-40 (quoting Dowling v. United States, 473 U.S. 207, 225 (1985)). In direct response to LaMacchia, Congress passed the No Electronic Theft (“NET”) Act, Pub. L. No. 105-147, 111 Stat. 2678 (1997), which, among other things, closed the “LaMacchia loophole” by eliminating “commercial advantage or private financial gain” as an element of felony copyright infringement. statute. See 143 Cong. Rec. 24,324 (1997) (remarks of Rep. Coble); H.R. Rep. No. 105-339, at 4-5 (1997). By enacting what was then 17 U.S.C. § 506(a)(2) (renumbered § 506(a)(1)(B) by the Apr. 27, 2005 amendments), Congress created a felony that only requires the government to prove willful infringement above certain monetary and numerical thresholds. Congress’s swift response to LaMacchia recognized how the Internet and then new technology had already dramatically changed the way in which copyright infringement was occurring and the resulting harm caused to copyright owners. Now, as then, the Internet allows people to engage in largescale digital piracy with little expense, time, or complexity. The ease of Internet piracy reduces (and perhaps eliminates) infringers’ need for a financial return even as it significantly affects the market for legitimate goods. See Committee Report on No Electronic Theft Act, H.R. Rep. No. 105-339, at 4-5 (1997). Willful infringers can act out of a variety of motives unrelated to profit— including a rejection of the copyright laws, anti-corporate sentiments, or bragging rights in the piracy community—yet still cause substantial financial harm. Id. Even though a profit motive is not a necessary element of every copyright offense, it should nonetheless be charged when possible because it increases the defendant’s maximum statutory sentence, increases the guideline sentencing range, increases jury appeal, and can help defeat baseless claims of fair use. See Sections C.5. and E.1 of this Chapter, and Section C.1.f. of Chapter VIII of this Manual. 56 Prosecuting Intellectual Property Crimes b. Legal Standard Essentially, a defendant has acted for “commercial advantage or private financial gain” if he sought a profit, financial or otherwise. Cf. 4 Nimmer on Copyright § 15.01[A][2] (discussing legislative history to copyright statute). “Financial gain” is broadly defined to include not only a monetary transaction, but also the “receipt, or expectation of receipt, of anything of value, including the receipt of other copyrighted works.” 17 U.S.C. § 101. Bartering schemes are included, where people trade infringing copies of a work for other items, including computer time or copies of other works. Congress added this definition of financial gain in the NET Act specifically to address bartering. See No Electronic Theft Act (NET) Act, Pub. L. No. 105-147, 111 Stat. 2678 (1997); 143 Cong. Rec. 24,421 (1997) (statement of Sen. Hatch); 143 Cong. Rec. 24,326 (1997) (statement of Rep. Goodlatte). For example, federal prosecutors have successfully charged “commercial advantage or private financial gain” in cases where defendants ran a closed piracy network that distributed pirated works in exchange for access to other pirated works. See, e.g., Department of Justice Press Release, California Man Pleads Guilty for Role in Distributing Pirated Music During Five-year Period (May 2, 2011), available at http://www.justice.gov/criminal/cybercrime/press-releases/2011/ montejanoPlea.pdf. Although courts have had few occasions to consider the scope of “commercial advantage,” the plain meaning of the term and case-law in other areas suggest that “commercial advantage” includes not only obtaining payment for infringing products, but also using the infringing products to obtain an advantage over a competitor. This is true even if the defendant charged nothing for the infringing copies. See Herbert v. Shanley Co., 242 U.S. 591, 593-94 (1917) (Holmes, J.) (holding that performing a copyrighted musical composition in a restaurant or hotel, even without charging for admission, infringes the copyright owner’s exclusive right to perform the work publicly for profit); A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1023 (9th Cir. 2001) (holding that “[f ]inancial benefit exists where the availability of infringing material acts as a draw for customers,” even when the infringing material is offered for free) (internal quotation marks and citation omitted), aff’g in pertinent part 114 F. Supp. 2d 896, 921 (N.D. Cal. 2000) (noting that Napster anticipated deriving revenues from users by offering copyrighted music for free); Twentieth Century Music Corp. v. Aiken, 356 F. Supp. 271, 275 (W.D. Pa. 1973) (holding that a business that merely plays background music to relax its employees so that they will be II. Criminal Copyright Infringement 57 efficient is infringing for profit), rev’d on other grounds, 500 F.2d 127 (3d Cir. 1974), aff’d 422 U.S. 151, 157 (1975) (assuming that restaurant owner acted for profit); Associated Music Publishers v. Debs Mem’l Radio Fund, 141 F.2d 852 (2d Cir. 1944) (holding that a radio station that without permission broadcasts a copyrighted work for free in order to get, maintain, and increase advertising revenue has done so for profit). Examples of infringement for commercial advantage include an engineering firm’s use of pirated drafting software to keep overhead low, a website that offers free pirated software to generate advertising revenue when downloaders visit the site, and a business that gives away counterfeit goods to draw in customers to whom it then sells legitimate services. In these cases, although the infringer may not expect to receive money or other items of value in exchange for the infringing copies, the infringement saves the business the money it would have spent on authorized copies or licenses. The savings allow the infringer to gain a commercial advantage over competitors who use only licensed copies of copyrighted works. Whether a defendant actually makes a profit is beside the point: what matters is that he intended to profit. See 17 U.S.C. § 101 (defining “financial gain” to include “expectation of receipt” of anything of value); id. § 506(a)(1) (A) (“for purposes of commercial advantage or private financial gain”) (emphasis added); 18 U.S.C. § 2319(d)(2) (same); United States v. Taxe, 380 F. Supp. 1010, 1018 (C.D. Cal. 1974) (“‘Profit’ includes the sale or exchange of the infringing work for something of value in the hope of some pecuniary gain. It is irrelevant whether the hope of gain was realized or not.”), aff’d in part and vacated in part on other grounds, 540 F.2d 961 (9th Cir. 1976); United States v. Shabazz, 724 F.2d 1536, 1540 (11th Cir. 1984) (same); United States v. Moore, 604 F.2d 1228, 1235 (9th Cir. 1979) (holding that acting “for profit,” as required by earlier version of Copyright Act, includes giving infringing work to a prospective buyer to evaluate for free before purchasing); United States v. Cross, 816 F.2d 297, 301 (7th Cir. 1987); Herbert, 242 U.S. at 595 (Holmes, J.) (holding that under the copyright statute the performance of a copyrighted work at a hotel or restaurant was for profit, even if customers did not pay specifically for the performance, because “[w]hether it pays or not, the purpose of employing it is profit and that is enough”). Prosecutors should generally refrain from alleging that a defendant obtained financial gain by getting free or discounted infringing works solely as a result of copying or downloading works for himself. This benefit is common 58 Prosecuting Intellectual Property Crimes to all infringement, and to hold that mere infringement equals private financial gain would convert every infringement case into one for private financial gain and thus erase important distinctions in the civil and criminal copyright statutes. Although there are apparently no reported opinions on this question in criminal copyright cases, a number of courts have followed this reasoning in interpreting a related statute with criminal and civil penalties for using and trafficking in unauthorized satellite and cable television decoders “for purposes of commercial advantage or private financial gain.” 47 U.S.C. § 553(b)(2). These courts held that the mere purchase and use of such a device for the defendant’s own benefit and that of his family and friends does not constitute “gain” within the meaning of that statute. See, e.g., Comcast Cable Commc’ns v. Adubato, 367 F. Supp. 2d 684, 693 (D.N.J. 2005) (holding that to qualify as commercial advantage or private financial gain, the defendant must have used the device “to further some commercial venture or profited in some way from the device beyond simply sitting by himself or with his family and friends around a television set using the illegal device to watch programs for which payment should have been made”); American Cablevision of Queens v. McGinn, 817 F. Supp. 317, 320 (E.D.N.Y. 1993) (holding that “private financial gain” should not be read to encompass defendant’s “gain” from receiving broadcasts himself: such an interpretation would render “gain” enhancement superfluous because all violations would result in gain). But see Charter Commc’ns Entm’t I, LLC v. Burdulis, 367 F. Supp. 2d 16, 32 (D. Mass. 2005) (holding that defendant who violated § 553 to receive unauthorized cable broadcasts did so for purposes of “financial gain” within the statute); Cablevision Sys. New York City Corp. v. Lokshin, 980 F. Supp. 107, 114 (E.D.N.Y. 1997) (same). A profit motive can be proved by circumstantial evidence. See United States v. Cross, 816 F.2d 297, 301 (7th Cir. 1987) (“[T]he presence of these seventeen second-generation videocassettes on [the defendant’s] business premises may rationally give rise to the inference that they were maintained for commercial advantage or private financial gain.”). 5. Misdemeanor Copyright Infringement To obtain a misdemeanor conviction under 17 U.S.C. § 506(a) and 18 U.S.C. § 2319, the government must demonstrate that: 1. A valid copyright exists; 2. The copyright was infringed by the defendant; II. Criminal Copyright Infringement 59 3. The defendant acted willfully; and 4. The infringement was done EITHER (a) for purposes of commercial advantage or private financial gain, 17 U.S.C. § 506(a)(1)(A); 18 U.S.C. § 2319(b)(3); OR (b) by reproduction or distribution of one or more copyrighted works with a total retail value of more than $1,000 within a 180-day period, 17 U.S.C. § 506(a)(1)(B); 18 U.S.C. § 2319(c)(3). Although the misdemeanor and felony crimes share some elements— all require proving willful infringement—the need to prove scope or scale is lessened for misdemeanors. In cases without commercial advantage or private financial gain that involve the reproduction or distribution of infringing copies, the threshold number of copies and monetary value for a misdemeanor are lower than those required for a felony under 18 U.S.C. §§ 2319(b)(1) or (c)(1): all that is required is one or more copies, with a total retail value of $1,000 or more. And in cases of for-profit infringement, the misdemeanor has no numerical or monetary prosecutorial thresholds. 18 U.S.C. § 2319(b)(3). Thus, misdemeanor copyright infringement can be charged when a defendant clearly profited or intended to profit, but where the government cannot prove the exact volume or value of the infringement due to a lack of business records or computer logs. A misdemeanor charge can also apply to willful, for-profit infringement of rights other than reproduction or distribution, such as the performance right or digital audio transmissions. Although the felony penalties are reserved for infringing reproduction and distribution, the misdemeanor provisions apply “in any other case,” see 18 U.S.C. § 2319(b)(3), such as the infringement of the other rights. C. Defenses 1. Statute of Limitations: 5 years The criminal copyright statute has a five-year statute of limitations. 17 U.S.C. § 507(a). The five-year limitations period was first established by the NET Act, Pub. L. No. 105-147 § 2(c), 111 Stat. 2678 (1997), before which the limitations period had been three years (the same as for civil copyright claims). See Copyright Act of 1976, Pub. L. No. 94-553, 90 Stat. 2541 (1976). 60 Prosecuting Intellectual Property Crimes 2. Jurisdiction United States copyright law generally has no extraterritorial effect. Although many foreign countries protect United States copyrights against infringement in foreign lands, and domestic law similarly protects foreign copyrighted works against infringement within the United States, 17 U.S.C. § 411(a), U.S. law generally “cannot be invoked to secure relief for acts of [copyright] infringement occurring outside the United States.” Palmer v. Braun, 376 F.3d 1254, 1258 (11th Cir. 2004); see also Subafilms, Ltd. v. MGM-Pathe Commc’ns, 24 F.3d 1088, 1091 (9th Cir. 1994) (en banc); Update Art, Inc. v. Modiin Pub’g, Ltd., 843 F.2d 67, 73 (2d Cir. 1988) (“It is well established that copyright laws generally do not have extraterritorial application.”). This means that some copyright cases cannot be brought in the United States, even when the victims are U.S. companies or nationals and the infringed works are copyrighted in the United States. For example, U.S. law does not grant federal courts jurisdiction over a manufacturing plant in southeast Asia that produces pirated DVDs for sale in Europe, if the infringing conduct occurs solely abroad. See Palmer, 376 F.3d at 1258. In addition, in civil copyright cases, most courts hold that a defendant in the United States who authorizes acts of infringing reproduction or distribution that occur outside the country, standing alone, does not violate United States copyright law sufficient to grant United States courts subject-matter jurisdiction. See Subafilms, 24 F.3d at 1091; Armstrong v. Virgin Records, Ltd., 91 F. Supp. 2d 628, 634 (S.D.N.Y. 2000) (reviewing cases and concluding that the Subafilms position is more widely accepted). But see Curb v. MCA Records, Inc., 898 F. Supp. 586, 593 (M.D. Tenn. 1995); Expediters Int’l of Washington, Inc. v. Direct Line Cargo Mgmt. Servs., Inc., 995 F. Supp. 468, 476 (D.N.J. 1998). However, these rules do not bar a United States copyright case if an infringing act does occur in the United States in whole or in part. Palmer, 376 F.3d at 1258; Sheldon v. Metro-Goldwyn Pictures Corp., 106 F.2d 45, 52 (2d Cir. 1939) (holding that court had power over profits made from showing a copied film outside the country because negatives from which the film was printed were made in the United States); Rundquist v. Vapiano SE, 798 F. Supp. 2d 102, 123-24 (D.D.C. 2011); P & D Int’l v. Halsey Pub’g Co., 672 F. Supp. 1429, 1432-33 (S.D. Fla. 1987) (finding subject-matter jurisdiction over copyright action because complaint alleged that defendant copied U.S.- II. Criminal Copyright Infringement 61 copyrighted film in Florida and then showed the film in international waters aboard cruise ship) (citing 3 Nimmer on Copyright § 17.02, at 17-5). Although to date no reported criminal cases have addressed this issue, the cases cited above provide a sound legal basis for prosecuting criminal infringement domestically when at least a part of the defendant’s infringing conduct occurred within the United States. Charging a conspiracy also allows for domestic jurisdiction over criminal copyright co-conspirators located outside the United States, if their co-conspirators act inside the country. See, e.g., Ford v. United States, 273 U.S. 593, 624 (1927) (holding that a conspiracy charge need not rely on extraterritorial principles if its object crime is in the U.S. and a co-conspirator commits an act in the U.S. to further the conspiracy); United States v. Winter, 509 F.2d 975, 982 (5th Cir. 1975). Additionally, at least in the context of capturing and retransmitting broadcast signals so as to infringe a copyright owner’s public performance right, there appears to be some disagreement between the courts as to whether it is necessary for a “complete” act of infringement to take place in the United States for the Copyright Act to apply. The Ninth Circuit has taken the position that at least one “complete” act of infringement must take place in the United States. See Allarcom Pay Television, Ltd. v. Gen. Instrument Corp., 69 F.3d 381, 387 (9th Cir. 1995) (holding that the Copyright Act did not apply to broadcasts of copyrighted material from the United States into Canada because the infringement was not completed until the signals were “received and viewed” in Canada). The Second Circuit, however, has strongly rejected that view, holding that an act of infringement need only be partially completed in the United States. See Nat’l Football League v. PrimeTime 24 Joint Venture, 98 CIV. 3778 (LMM), 1999 WL 163181, at *3 (S.D.N.Y. Mar. 24, 1999) (Copyright Act applied where defendant’s “transmission of the signals captured in the United States is ‘a step in the process by which a protected work wends its way to its audience,’ although not the only, or the final, step, and an infringement, even though it takes one or more further steps for the work to reach the public”), aff’d 211 F.3d 10, 13 (2d Cir. 2000) (according the Ninth Circuit law “little weight largely because it contains no analysis of the Copyright Act.”); see also WGN Cont’l Broadcasting Co. v. United Video, Inc., 693 F.2d 622, 624-25 (7th Cir. 1982) (concluding that an intermediate carrier is not immune from copyright liability simply because it does not retransmit a copyrighted signal to the public directly but instead routes the signal to cable systems, which then retransmit to the public). While Allarcom has generally 62 Prosecuting Intellectual Property Crimes been limited to its specific facts (and has rarely been applied outside of the Ninth Circuit), prosecutors can avoid the issue, where possible, by charging an act of infringement completed within the United States. As discussed above, prosecutors may also avoid the issue by charging a conspiracy. For more on the lack of extraterritorial application of U.S. copyright law, see I. Trotter Hardy, U.S. Copyright Office, Project Looking Forward: Sketching the Future of Copyright in a Networked World, Final Report 132 (1998), available at http://www.copyright.gov/reports/thardy.pdf. 3. Venue Crimes “begun in one district and completed in another, or committed in more than one district, may be inquired of and prosecuted in any district in which such offense was begun, continued, or completed.” 18 U.S.C. § 3237(a). Few reported cases have directly addressed this issue in criminal copyright prosecutions. See United States v. Tucker, 495 F. Supp. 607, 618 (E.D.N.Y. 1980) (holding that although defendant resided outside district, venue was proper for grand jury investigation into defendant’s sales of counterfeit sound recordings because “middleman” in defendant’s scheme resided, and purchaser was headquartered, in district). Cases addressing venue in analogous cases suggest that venue would be proper in any district where reproduction or distribution occurred, or through which pirated works were shipped. Cf. United States v. DeFreitas, 92 F. Supp. 2d 272, 276-77 (S.D.N.Y. 2000) (holding in criminal trademark case involving importation and distribution of counterfeit “Beanie Babies” that offense was a continuing offense and thus venue was proper in any district where the offense was begun, continued, or completed, i.e., where products entered the U.S., were shipped, or sold); United States v. Rosa, 17 F.3d 1531, 1541 (2d Cir. 1994) (holding that in conspiracy to transport stolen goods, venue was proper where the agreement was entered into, or where any overt act in furtherance of the conspiracy was committed). 4. The First Sale Doctrine—17 U.S.C. § 109 a. Operation of the Doctrine A common defense to a claim of infringement of the distribution right is the “first sale” doctrine, codified at 17 U.S.C. § 109, which provides that “[n]otwithstanding the provisions of section 106(3), the owner of a particular copy or phonorecord lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to II. Criminal Copyright Infringement 63 sell or otherwise dispose of the possession of that copy or phonorecord.” In other words, once a copyright-holder sells or gives a specific copy to another person, the copyright-holder generally cannot control how that particular copy is subsequently sold or transferred. See United States v. Moore, 604 F.2d 1228, 1232 (9th Cir. 1979); see also 2 Nimmer on Copyright § 8.12[B] (discussing first sale); 4 Nimmer on Copyright § 15.01[A][2] (discussing application of “first sale” in criminal cases). Putting it in terms of the purchaser’s rights, the first purchaser and any subsequent purchaser of that specific copy may further distribute or dispose of that particular copy without the copyright-holder’s permission. The first sale doctrine does not grant the purchaser or anyone else the right to make additional copies of the copy he owns. Making unauthorized copies of a lawfully-obtained work still violates the law. 4 Nimmer on Copyright § 15.01[A][2], at 15-10. Consequently, the first sale doctrine is a defense only against an allegation of infringement by means of distribution. Moreover, the first sale doctrine may be invoked by a defendant only for the distribution of lawfully-made copies. If copies were pirated, the first sale doctrine does not apply. See United States v. Drum, 733 F.2d 1503, 1507 (11th Cir. 1984) (citing Moore, 604 F.2d at 1232); United States v. Powell, 701 F.2d 70, 72 (8th Cir. 1983). Additionally, a person may not sell or give away his lawful copy while retaining a backup copy, even a backup copy of software that is authorized by 17 U.S.C. § 117. See 17 U.S.C. § 117(a)(2) (requiring destruction of archival copies if continued possession of original copy ceases to be rightful); see also 17 U.S.C. § 117(b) (allowing transfer of exact archival copies only with a complete transfer of rights in the original copy). An unlawfully retained backup copy can be an infringing reproduction. See Section C.6. of this Chapter for a discussion of the “archival” exception codified at 17 U.S.C. § 117(a)(2). The first sale doctrine protects a defendant only if he owned his copy, not if he merely borrowed or rented it. In fact, the first sale doctrine does not “extend to [protect] any person who has acquired possession of the copy or phonorecord from the copyright owner, by rental, lease, loan, or otherwise, without acquiring ownership of it.” 17 U.S.C. § 109(d) (emphasis added). This is an important distinction for works such as motion picture film reels, which are typically distributed to movie theaters under a lease or similar arrangement, and computer software, which is often distributed subject to a licensing agreement. 64 Prosecuting Intellectual Property Crimes It is not always clear, however, whether a commercial transaction of copyrighted works is legally a sale or a licensing agreement, which can make or break a first sale defense. How the parties characterize the transaction to themselves or others may not be controlling as a matter of law. When a computer user “purchases” a copy of software through a retail channel or other means, the licensing agreement may actually assert that the arrangement is not an outright purchase of a copy but merely a license to use the work. Were these licensing agreements the last word on the subject, § 109 would not allow the licensee to resell his software. Yet many courts have recharacterized a software publisher’s shrinkwrap licensing agreement as a sale when the publisher distributes its software through retail channels. See Softman Prods. Co. v. Adobe Sys., Inc., 171 F. Supp. 2d 1075 (C.D. Cal. 2001); Novell, Inc. v. Network Trade Ctr., Inc., 25 F. Supp. 2d 1218, 1230 (D. Utah 1997), vacated in part on other grounds, 187 F.R.D. 657 (D. Utah 1999); ProCD, Inc. v. Zeidenberg, 908 F. Supp. 640 (W.D. Wis. 1996), rev’d on other grounds, 86 F.3d 1447 (7th Cir. 1996); see also Krause v. Titleserv, Inc., 402 F.3d 119 (2d Cir. 2005); Mark Lemley, Intellectual Property and Shrinkwrap Licenses, 68 S. Cal. L. Rev. 1239, 1244 n.23 (1995) (discussing cases). Other courts have taken the opposite position, however, holding that a copy of software obtained subject to license is not subject to the first sale doctrine or other benefits of “ownership.” See Apple Inc. v. Psystar Corp. 658 F.3d 1150, 1155-56 (9th Cir. 2011); Vernor v. Autodesk, Inc., 621 F.3d 1102 (9th Cir. 2010), cert. denied, 132 S. Ct. 105 (2011); Adobe Sys., Inc. v. Stargate Software Inc., 216 F. Supp. 2d 1051, 1058 (N.D. Cal. 2002); Adobe Sys. Inc. v. One Stop Micro, Inc., 84 F. Supp. 2d 1086, 1089 (N.D. Cal. 2000); Microsoft Corp. v. Software Wholesale Club, Inc., 129 F. Supp. 2d 995, 1002 (S.D. Tex. 2000) (citing Microsoft Corp. v. Harmony Computers & Elec., Inc., 846 F. Supp. 208, 212-14 (E.D.N.Y. 1994)); see also Lemley, 68 S. Cal. L. Rev. at 1244 n.23. Although no reported criminal case to date appears to have addressed the specific issue of whether an unauthorized transfer of a lawfully-obtained copy of software subject to an end-user license agreement can constitute criminal copyright infringement, the question may yet arise in cases involving “repackaged” software, in which some elements of the software package are genuine, while others are copied or altered. See, e.g., Stargate Software Inc., 216 F. Supp. 2d at 1058 (rejecting argument that first sale doctrine should apply to academic versions of software repackaged and sold as retail versions). In such cases, prosecutors may wish to consider other charges, such as 18 U.S.C. § 2318 (counterfeit or illicit labels, documentation, or packaging for II. Criminal Copyright Infringement 65 copyrighted works). See United States v. Harrison, 534 F.3d 1371 (11th Cir. 2008) (holding that the first sale doctrine does not apply to 18 U.S.C. § 2318). An important question concerning first sale, recently resolved by the Supreme Court, concerns whether it applies to copies produced abroad and later imported into the United States. Federal courts had reached differing conclusions on this issue. See, e.g., Quality King Distribs., Inc. v. L’anza Research Int’l, Inc., 523 U.S. 135, 145 (1998) (first sale doctrine under § 109 permits reimportation and resale of copy originally produced legally in the United States); Omega S. A. v. Costco Wholesale Corp., 541 F. 3d 982, 986 (9th Cir. 2008) (§ 109 permits resale of copies manufactured abroad only if an authorized first sale occurs within the United States), aff ’d by an equally divided court, 562 U. S. ___ (2010); Sebastian Int’l, Inc. v. Consumer Contacts (PTY) Ltd., 847 F. 2d 1093, 1098 n.1 (3rd Cir. 1988) (limitation of the first sale doctrine to copies made within the United States “does not fit comfortably within the scheme of the Copyright Act”). In Kirtsaeng v. John Wiley & Sons, Inc., No. 11-697, __ U.S. __ (Mar. 19, 2013), the Supreme Court held that the first sale provision of § 109 applies to copies “lawfully made” outside the United States, thus permitting purchasers of copies manufactured abroad to import such copies into the U.S. and sell or otherwise distribute them within the U.S. without permission from the copyright owner, so long as the copies were originally produced with the copyright owner’s authorization. b. Affirmative Defense or Part of the Government’s Case-in-Chief Courts disagree as to whether the government must prove absence of “first sale” as part of its case-in-chief in a criminal case. See 4 Nimmer on Copyright § 15.01[A][2], at 15-8 to 15-9. In civil cases, “first sale” is an affirmative defense. See 2 Nimmer on Copyright § 8.12[A]; H.R. Rep. No. 94-1476, at 81 (1976) (“It is the intent of the Committee, therefore, that in an action to determine whether a defendant is entitled to the privilege established by section 109(a) and (b), the burden of proving whether a particular copy was lawfully made or acquired should rest on the defendant.”), reprinted in 1976 U.S.C.C.A.N. 5659, 5695. The better rule is to apply the civil rule in criminal cases. See, e.g., United States v. Larracuente, 952 F.2d 672, 673-74 (2d Cir. 1992); United States v. Goss, 803 F.2d 638, 643-44 (11th Cir. 1986); United States v. Drum, 733 F.2d 1503, 1507 (11th Cir. 1984). There is no good reason for shifting an affirmative defense in civil cases to an element of the offense in criminal cases, 66 Prosecuting Intellectual Property Crimes given that the government must already prove that the defendant engaged in infringement willfully. Yet several cases state the opposite, that in criminal cases the government must negate first sale as an element of the offense. See, e.g., United States v. Cohen, 946 F.2d 430, 434 (6th Cir. 1991); United States v. Sachs, 801 F.2d 839, 842 (6th Cir. 1986); United States v. Powell, 701 F.2d 70, 72-73 (8th Cir. 1983); United States v. Moore, 604 F.2d 1228, 1232-33 (9th Cir. 1979); United States v. Wise, 550 F.2d 1180, 1191-92 (9th Cir. 1977); United States v. Atherton, 561 F.2d 747, 749 (9th Cir. 1977); United States v. Drebin, 557 F.2d 1316, 1326 (9th Cir. 1977); United States v. Wells, 176 F. Supp. 630, 633 (S.D. Tex. 1959). c. Disproving First Sale at Trial The easiest way to negate the first sale doctrine is to introduce evidence of reproduction of unauthorized copies. Two types of circumstantial proof typically suffice. First, the government can introduce evidence that the defendant obtained his copies illegitimately. See Moore, 604 F.2d at 1232 (holding that government may establish absence of first sale by circumstantial evidence, as well as by tracing distribution); United States v. Whetzel, 589 F.2d 707, 711-12 (D.C. Cir. 1978) (holding that tapes’ illicit origin was shown by labels on tapes listing a manufacturer with a non-existent address, tapes’ low price, and the circumstances of their sale), abrogated on other grounds, Dowling v. United States, 473 U.S. 207 (1985). Factors indicating that copies were obtained illicitly include the sale of copies at a price far below the legitimate market value, the distribution of copies of inferior quality, the existence of copies with identical serial numbers, and the presence of false information on the copies, such as a false address for the manufacturer, fictitious labels, or sales under suspicious circumstances. See, e.g., Drum, 733 F.2d at 1507 (rebuttal of first sale defense included direct and circumstantial evidence concerning fictitious labels, low prices, and clandestine sale); Whetzel, 589 F.2d at 712 (sale of copies of tapes from the back of a van in a parking lot). Second, the government can introduce evidence that the copyright holder never sold copies of the work at all, which shows that the defendant could not have obtained ownership of legitimate copies. See United States v. Sachs, 801 F.2d 839 (6th Cir. 1986) (holding that government negated the first sale doctrine with respect to movie videotapes with evidence that the original movies had never been sold legitimately in same format); United States v. Drebin, 557 F.2d 1316 (9th Cir. 1977) (holding that government proved the absence of first sale through evidence that copyrighted movies had never been II. Criminal Copyright Infringement 67 sold or transferred and that licenses transferring limited rights for distribution and exhibition of the films for a limited time were not “sales” for purposes of the first sale doctrine). But see United States v. Atherton, 561 F.2d 747 (9th Cir. 1977) (holding that government failed to prove the absence of first sale because, although the copyright owner never “sold” film copies, it permitted a major television network to permanently retain copies and sold scrap film to salvage company for consideration, all of which fell within the definition of first sale and could have been the defendant’s source). The government need not account for the distribution of every copy of a work. See, e.g., Moore, 604 F.2d at 1232 (“[T]he Government can prove the absence of a first sale by showing that the [copy] in question was unauthorized, and it can establish this proof ... by circumstantial evidence from which a jury could conclude beyond a reasonable doubt that the recording was never authorized and therefore never the subject of a first sale.”); see also Sachs, 801 F.2d at 843 (holding that the government need not trace every single copy to its origins, because “[t]he other recognized method of satisfying [the first sale] doctrine is for the government to ... show that the copies in question have illegitimate origins”); Drum, 733 F.2d at 1507 (“The government may prove the absence of a first sale by direct evidence of the source of the pirated recordings or by circumstantial evidence that the recording was never authorized.”) (citations omitted); Whetzel, 589 F.2d at 711 (“It was not required to disprove every conceivable scenario in which appellant would be innocent of infringement.”). d. Special Rules for Rental, Lease, and Lending Although the first sale doctrine extends to almost all types of copyrighted works, it has some limitations with respect to some types of sound recordings and computer programs, which generally may be resold or given away but cannot be rented, leased, or loaned without the copyright-owner’s permission. See 17 U.S.C. § 109(a), (b)(1)-(2) (describing exception and the types of computer programs that do not qualify for the exception). But see § 109(b) (2)(A) (providing that this does not apply to the rental, lease, or loan of a phonorecord for nonprofit purposes by a nonprofit library or educational institution). Regardless, the unauthorized (and thus infringing) rental or lending of sound recordings and computer programs is not subject to criminal penalties. See § 109(b)(4). Although unauthorized rental or leasing of certain types of works is not directly subject to criminal sanctions, businesses that advertise or engage in 68 Prosecuting Intellectual Property Crimes this type of conduct might still be subject to criminal copyright infringement penalties. For example, assume that a business rents CDs containing music and tells its customers to “burn it and return it,” i.e., to make a copy before bringing it back. Would the above rules exempt this business from criminal prosecution? On the one hand, the answer appears to be “yes,” since 17 U.S.C. § 109(b)(4) states that the unauthorized rental of sound recordings “shall not be a criminal offense.” On the other hand, this conduct may extend beyond mere “unauthorized rental” to active solicitation, aiding-and-abetting, or conspiracy to commit criminal copyright infringement. No published case has yet addressed this issue. 5. Fair Use The fair use doctrine is an affirmative defense to copyright infringement. It allows the unauthorized use of copyrighted material under certain circumstances generally limited to useful or beneficial purposes with minimal impact on the market for the work. Specifically, the fair use doctrine, codified at 17 U.S.C. § 107, allows the unauthorized use of copyrighted works “for purposes such as criticism, comment, news reporting, teaching ..., scholarship, or research” and other, unspecified, purposes and uses. Fair use is designed to ensure that the rights of authors are balanced with the interest of the public in the free flow of information. See, e.g., Pierre Leval, Toward a Fair Use Standard, 103 Harv. L. Rev. 1105, 1110 (1990) (commentary by Judge Pierre Leval, United States District Court for the Southern District of New York). Congress has noted that fair use is the most important limitation on the exclusive rights granted copyright owners, H.R. Rep. No. 94-1476, at 65 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5678, and the Supreme Court has characterized fair use as one of copyright law’s built-in accommodations to the First Amendment. See Eldred v. Ashcroft, 537 U.S. 186, 219-20 (2003). By design, the fair use doctrine is fluid and applies not according to definite rules, but rather according to a multi-factor balancing test. See H.R. Rep. No. 94-1476, at 66 (1976). The statute cites four non-exclusive factors: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; II. Criminal Copyright Infringement 69 (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. 17 U.S.C. § 107. Other unspecified factors may be appropriate. It would be difficult to articulate a more determinate set of fair use rules, given the variety of copyrighted works, their uses, and the situations in which they can be used. Consequently, both through case law and statutory codification, fair use has historically been decided on a case-by-case basis looking at the totality of the facts at hand. See H.R. Rep. No. 94-1476, at 65-66 (1976). Although the fair use doctrine has developed primarily in civil cases, those cases have precedential weight in criminal cases. The first factor to consider is the purpose and character of the use. 17 U.S.C. § 107(1). A commercial use is presumptively unfair, whereas for a noncommercial, nonprofit activity, “[t]he contrary presumption is appropriate.” Sony Corp. of Am. v. Universal Studios, 464 U.S. 417, 449 (1984). Nevertheless, “the mere fact that a use is educational and not for profit does not insulate it from a finding of infringement, any more than the commercial character of a use bars a finding of fairness.” Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 584 (1994). Another consideration relevant to the first factor is whether the use is “transformative” or, in other words, adds something new or different beyond a mere repackaging or restatement of the original: “Although such transformative use is not absolutely necessary for a finding of fair use, the goal of copyright, to promote science and the arts, is generally furthered by the creation of transformative works.” Id. at 579 (citation omitted); see also Leval, 103 Harv. L. Rev. at 1111 (“The use must be productive and must employ the quoted matter in a different manner or for a different purpose from the original. A quotation of copyrighted material that merely repackages or republishes the original is unlikely to pass the test.”). If a work is transformative, other factors that normally weigh against finding of fair use, such as the commercial nature of the use, bear less weight. See Acuff-Rose, 510 U.S. at 579. The second factor is the nature of the copyrighted work. See 17 U.S.C. § 107(2). “This factor calls for recognition that some works are closer to the core of intended copyright protection than others.” Acuff-Rose, 510 U.S. at 586. Fair use is more difficult to establish in the use of fictional or purely 70 Prosecuting Intellectual Property Crimes creative or fanciful works, as opposed to more factual or historical (yet still copyrightable) works, such as recollections of public figures, or depictions of newsworthy events. See id. “The law generally recognizes a greater need to disseminate factual works than works of fiction or fantasy.” Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539, 563 (1985). The third factor is the amount and substantiality of the use “in relation to the copyrighted work as a whole.” See 17 U.S.C. § 107(3). A defense of fair use is less likely to succeed if the portion of the copyrighted material used is substantial in quantity or importance. See Harper & Row, 471 U.S. at 56466 (holding news magazine’s 300-word excerpt of book not to be fair use because quoted sections were key passages). However, a use can be fair even if it copies the entire work. See Online Policy Group v. Diebold, Inc., 337 F. Supp. 2d 1195 (N.D. Cal. 2004) (granting summary judgment to group that had published voting machine manufacturer’s entire email archive to publicly expose machines’ flaws); Kelly v. Arriba Soft Corp., 336 F.3d 811 (9th Cir. 2003) (holding defendant’s copying of entire images to create online searchable database of “thumbnails” was fair use). The fourth factor is how substantially the use affects the potential market for the copyrighted work or the work’s actual value. See 17 U.S.C. § 107(4). “[T]o negate fair use one need only show that if the challenged use ‘should become widespread, it would adversely affect the potential market for the copyrighted work.’ This inquiry must take account not only of harm to the original but also of harm to the market for derivative works.” Harper & Row, 471 U.S. at 568 (citations omitted). The Supreme Court has emphasized the importance of this factor in cases of noncommercial use. Sony, 464 U.S. at 451 (“A challenge to a noncommercial use of a copyrighted work requires proof either that the particular use is harmful, or that if it should become widespread, it would adversely affect the potential market for the copyrighted work.”). See Harper & Row, 471 U.S. at 540-41 (finding that harm to potential market was indicated by fact that magazine cancelled its contract to reprint segment of book after defendant published article quoting extensively from book). Again, these are non-exclusive factors that may be supplemented as technology and circumstances require. See 17 U.S.C. § 107. a. Unpublished Works A defendant’s use of an unpublished copyrighted work may qualify as a fair use. In 1992, Congress amended 17 U.S.C. § 107 to make explicit that II. Criminal Copyright Infringement 71 “[t]he fact that work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors [in § 107(1)(4)].” Act of Oct. 24, 1992, Pub. L. No. 102-492, 106 Stat. 3145 (1992); see also H.R. Rep. No. 102-836, at 7 (1992), reprinted in 1992 U.S.C.C.A.N. 2553, 2559 (legislative history underscores that Congress intended there to be no per se rule barring the fair use of unpublished works). This was primarily, but not exclusively, out of concern for the needs of biographers, historians, and publishers concerned with court decisions that suggested that they could not use unpublished material of historical interest—such as the unpublished letters and diaries of major authors or public figures—in books or other serious treatments of historical figures and events. See id. at 4-9 (citing Salinger v. Random House, Inc., 650 F. Supp. 413 (S.D.N.Y. 1986), rev’d, 811 F.2d 90 (2d Cir.), cert. denied, 484 U.S. 890 (1987); New Era Publ’ns Int’l, ApS v. Henry Holt & Co., 684 F. Supp. 808 (S.D.N.Y. 1988); New Era Publ’ns Int’l, ApS v. Henry Holt & Co., 695 F. Supp. 1493 (S.D.N.Y. 1988), aff’d on other grounds, 873 F.2d 576 (2d Cir. 1989)). Congress heeded this concern and thereafter amended the fair use statute to include the fair use of unpublished works, not limiting it to works of historic value. b. Fair Use in Criminal Cases Although the fair use doctrine has been developed mainly through civil cases, it is a defense to a charge of infringement, and thus a legitimate defense in criminal cases. However, fair use rarely comes up in the criminal context, most likely because prosecutors are reluctant to prosecute where fair use is a serious issue. A fair use is not an infringing use, and without an infringement there are no grounds for copyright prosecution. See 17 U.S.C. § 107 (“[T]he fair use of a copyrighted work ... is not an infringement of copyright.”); 17 U.S.C. § 506(a) (specifying grounds for prosecuting “[a]ny person who willfully infringes a copyright”) (emphasis added). Moreover, a defendant who believed in good faith that he was engaging in fair use has a complete defense to the mens rea element, which requires the government to prove that the defendant infringed willfully. See Section B.2.a. of this Chapter. (As indicated in Section B.2.b., a bad-faith claim of fair use, on the other hand, might help establish willfulness.) Prosecutors are—and generally should be—reluctant to seek charges where the defendant acted “for purposes such as criticism, comment, news reporting, teaching ..., scholarship, or research” or any other use with a beneficial public purpose. See 17 U.S.C. § 107. 72 Prosecuting Intellectual Property Crimes When the defendant is charged with violating 17 U.S.C. § 506(a)(1) (A)—infringement for purposes of commercial advantage or private financial gain—fair use will ordinarily not be a defense because commercial uses are presumptively unfair. Sony, 464 U.S. at 449. On the other hand, some commercial uses, such as commercial parodies of other works, have been found to be fair. See Acuff-Rose, 510 U.S. at 594. Because of the fair use doctrine’s concern with noncommercial uses, fair use is more likely to pose a significant defense in criminal cases that do not allege a profit motive, such as large-scale infringement under § 506(a)(1)(B) and certain § 506(a)(1)(C) offenses. However, courts have rejected fair use arguments in civil cases against peer-to-peer file-traders who had no direct commercial motive. See BMG Music v. Gonzalez, 430 F.3d 888, 890 (7th Cir. 2005) (finding that a peer-to-peer user who downloaded at least 30 and as many as 1300 songs, and kept them, did “not engage[] in a nonprofit use” for purposes of fair use analysis); Sony BMG Music Entm’t v. Tenenbaum, 672 F. Supp. 2d 217, 227-28 (D. Mass. 2009) (granting plaintiff’s motion for summary judgment as to fair use defense, despite finding that defendant’s acts of downloading and distributing 30 copyrighted songs did not constitute “commercial” use, where defendant’s use “was not accompanied by any public benefit or transformative purpose that would trigger the core concerns of the doctrine”). That said, there is a wide gulf between the typical criminal copyright case and the typical case in which fair use is a legitimate defense. In most criminal cases, the defendant does not even arguably act “for purposes such as criticism, comment, news reporting, teaching ..., scholarship, or research.” See 17 U.S.C. § 107. Furthermore, many criminal prosecutions involve the wholesale piracy of commercially popular works, in which a fair use defense would be undercut by the fair use factors concerning “the amount and substantiality of the portion used in relation to the copyrighted work as a whole,” and “the effect of the use upon the potential market for or value of the copyrighted work.” § 107(3), (4). The works are generally copied in their entirety, and the wide availability of the free, pirated copies (which suffer no degradation in quality in digital form) can have a drastic effect on the potential market for legitimate works. A strong showing on these factors will help overcome the presumption that noncommercial use is fair. II. Criminal Copyright Infringement 73 6. “Archival Exception” for Computer Software—17 U.S.C. § 117 Section 117 of Title 17 provides a limited exception to the blanket rule against copying, by allowing one who owns a copy of a computer program to copy the program as necessary to use the program or do machine maintenance or repair, and as an archival backup, subject to certain limitations. Specifically, § 117(a) provides that “it is not an infringement [of copyright] for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program” under two circumstances. The first is if the making of the copy or adaptation is “an essential step in the utilization of the computer program in conjunction with a machine, and that [the copy] is used in no other manner.” 17 U.S.C. § 117(a)(1). Essentially, this allows the lawful owner of a piece of software to install it on his machine, even if doing so requires copying the program from a CD-ROM to the hard drive or loading it from the hard drive into RAM, both of which are considered reproduction under copyright law. See Micro-Sparc, Inc., v. Amtype Corp., 592 F. Supp. 33 (D. Mass. 1984) (holding that purchasers of programs sold in printed form do not infringe copyright by typing code into computer in order to use the programs); Summit Tech., Inc. v. High-Line Med. Instruments Co., 922 F. Supp. 299 (C.D. Cal. 1996) (holding that owners of ophthamological laser system did not infringe copyright by turning on system to use it, causing copy of manufacturer’s data table to be loaded into system RAM); cf. MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511 (9th Cir. 1993) (holding that loading of copyrighted software into RAM by service company constitutes reproduction). The second circumstance in which § 117 allows copying is if the copy is “for archival purposes only and that all archival copies are destroyed in the event that continued possession of the computer program should cease to be rightful.” 17 U.S.C. § 117(a)(2). This provision allows one who owns a piece of software to make a backup copy for safekeeping, but requires him to destroy his backup copies if he sells or otherwise transfers his original copy or if his ownership otherwise ceases to be rightful. A third subsection of § 117 provides it is not an infringement for a machine’s owner or lessee to make or authorize the making of a copy of a computer program if the copy is made solely as a result of the activation of a machine containing a lawful copy of the software, and the copy is used solely to repair or maintain the machine, and is destroyed immediately thereafter. 17 U.S.C. § 117(c); see also Storage Tech. Corp. v. Custom Hardware Eng’g & Consulting, Inc., 431 F.3d 1374, 1375 (Fed. Cir. 2005). 74 Prosecuting Intellectual Property Crimes Section 117’s exceptions benefit the “owner of a copy of a computer program” or, in the case of machine repair and maintenance, “the owner or lessee of a machine.” 17 U.S.C. § 117(a), (c). However, because most computer software is distributed subject to a license, rather than a conventional outright sale, the question arises (in much the same way as it does in the context of “first sale” under § 109) whether § 117 allows copying by a person who has legally obtained a copy of a computer program, but licenses rather than “owns” the software. See the discussion of first sale in Section C.4. of this Chapter. As with the analogous first sale question, courts are split on the issue. Compare Krause v. Titleserv, Inc., 402 F.3d 119 (2d Cir. 2005) (holding client to be an “owner,” for § 117(a) purposes, of copies of computer programs written for it by consultant despite lack of formal title in copies, because it had paid consultant to develop programs for its sole benefit, copies were stored on client’s server, and client had right to use or discard copies as it saw fit) with CMAX/ Cleveland, Inc. v. UCR, Inc., 804 F. Supp. 337 (M.D. Ga. 1992) (holding that licensee of copyrighted computer software system and its employees were not entitled to computer program owner’s defense to copyright-holder’s copyright infringement action, because the licensee and employees never “owned” copy of the program, and there was evidence that the licensee was going to market its program); cf. ISC-Bunker Ramo Corp. v. Altech, Inc., 765 F. Supp. 1310 (N.D. Ill. 1990) (holding defendant not entitled to § 117 exception because it acquired copy from competitor and possession was unauthorized). Some sellers of pirated software display a disclaimer or other notice claiming that their distribution of unauthorized copies is somehow permitted under 17 U.S.C. § 117. Such claims are baseless. Although there are no reported criminal cases addressing this defense, courts have interpreted § 117 narrowly. See, e.g., Micro-Sparc, Inc., 592 F. Supp. at 35 (while § 117 allowed owners of written copy of source code to type it in to their own computers, it did not permit thirdparty business to type in source code and sell it on diskette). Moreover, the fact that a defendant was sufficiently aware of copyright issues to make a frivolous or bad-faith claim of compliance with § 117 may help establish willfulness. Cf. United States v. Gardner, 860 F.2d 1391, 1396 (7th Cir. 1988) (holding “Notice of Warning” by seller of “black boxes” for receiving unauthorized cable television, disclaiming liability for any illegal uses, “establish[es] that he was well aware that his actions were unlawful”); United States v. Knox, 32 F.3d 733, 754 (3d Cir. 1994) (rejecting argument that disclaimers in brochure stating that child pornography videos were legal disproved the mens rea element and because “[i]f anything, the need to profess legality should have alerted II. Criminal Copyright Infringement 75 [defendant] to the films’ dubious legality”); Rice v. Paladin Enters., Inc., 128 F.3d 233, 254 (4th Cir. 1997) (holding that jury could find the “For academic study only!” disclaimer in promotional sales catalog for “Hit Man” book “to be transparent sarcasm designed to intrigue and entice”). D. Emerging and Special Issues Most of the special issues in criminal copyright law concerning registration, Internet piracy, and pre-release piracy have been addressed throughout this chapter. Additional emerging areas involving streaming and linking sites are briefly highlighted below. Prosecutors who encounter emerging and special issues involving streaming, linking sites or others not addressed in this chapter should contact CCIPS at (202) 514-1026 for further advice or to suggest them for an update to be published in the electronic edition of this Manual. 1. Internet Streaming The past decade has seen a rapid rise in the use of Internet “streaming” technology as a means to disseminate content online. “Streaming” generally refers to the delivery of digital media content in real time, so that it may be watched, listened to, or played contemporaneously with the transfer of the media data to a recipient’s device. Popular streaming media sites and services currently include YouTube, Hulu, Vimeo, Pandora, and Spotify. Netflix and Amazon, for instance, offer online streaming of movies in addition to offering copies of movies for sale or rental, and (in the case of Amazon) offering downloads of music files for a fee. There are also a large and growing number of Internet sites that offer infringing content via streaming, many of which derive substantial revenues through advertising or user subscription fees. In contrast to a “download” model, in which a recipient receives a complete and permanent copy of a media file, when media content is delivered solely for streaming, the recipient will generally not retain a complete or permanent copy of the media file on the receiving device (although pieces of the media file being received may be buffered or stored temporarily as part of the streaming process). Streaming is also comparatively resource intensive, as playing media files to many different users in real time, without pauses or gaps, requires powerful servers and significant amounts of Internet bandwidth. Widespread use of streaming has become an increasingly viable option to disseminate media content both legitimately and illegitimately as costs for data storage processing power and bandwidth have fallen significantly. 76 Prosecuting Intellectual Property Crimes Although currently unsettled, existing criminal copyright laws (as of this writing) are not ideally suited to address serious cases of infringing streaming. The penalty provisions in 18 U.S.C. §2319 were drafted in an era when the vast majority of online infringement involved the creation and transfer of complete and permanent electronic copies. As a result, existing criminal copyright law provides felony penalties only for infringements that involve the “reproduction” or “distribution” of a minimum number of copies above a threshold value. To the extent that streaming of copyrighted works does not involve creating or transferring complete or permanent copies of a work, it is generally viewed as implicating copyright’s “public performance” and “public display” rights in a work, rather than the “reproduction” or “distribution” rights. See, e.g., United States v. Am. Soc’y of Composers, Authors, and Publishers, 485 F. Supp. 2d 438, 442-47 (S.D.N.Y. 2007) (distinguishing between distribution and performance of digital music); 3 William F. Patry on Copyright § 8:23 (2012). Accordingly, an illegal streaming site that willfully infringes copyrighted works by streaming may not violate the reproduction or distribution rights to a sufficient degree to be eligible for felony copyright penalties. As of this writing, there have been several legislative proposals to amend criminal copyright penalties to address significant cases involving Internet streaming. See, e.g., Administration’s White Paper on Intellectual Property Enforcement Legislative Recommendations at 10 (March 2011), available at http://www.whitehouse.gov/sites/default/files/ip_white_paper. pdf; Commercial Felony Streaming Act, S. 978 112th Cong. (2011). In general, these proposals would expand copyright felony penalties to apply to infringements of the “public performance” or “public display” rights under certain circumstances. Setting aside possible legislative changes, prosecutors have other options to pursue significant cases involving Internet streaming. For example, even though a site may be primarily engaged in Internet streaming, the site may also be engaged in related conduct that involves felony reproduction or distribution. Some sites that offer streaming of infringing content also allow users to download complete copies, typically for an additional fee. Assembling a pirate streaming site also requires the infringing content to be copied onto the site’s servers. This copying, if sufficient to meet the numeric and monetary thresholds (and other elements) of 18 U.S.C. § 2319, may form a sufficient basis for a felony charge. II. Criminal Copyright Infringement 77 Existing law also provides misdemeanor penalties for willful infringements involving any of the exclusive rights protected by copyright (not just reproduction and distribution) when committed for purposes of commercial advantage or private financial gain. See 17 U.S.C. § 506(a)(1)(A); 18 U.S.C. 2319(b)(3). Because streaming is relatively resource intensive, major infringing streaming sites are generally supported by advertising or subscriber fees, and, therefore, one option for pursuing a site willfully engaged in infringing streaming is to charge one or more misdemeanors. 2. Cyberlockers and Linking Sites Although remote storage of data files has long been a staple use of the internet and other online services (see, e.g., Electronic Communications Privacy Act (ECPA) of 1986, Pub. L. No. 99-508, 100 Stat. 1848 (1986) (creating definition, at 18 U.S.C. § 2711(2), of “remote computing service”)), the past several years have witnessed a rapid rise in the use of a new generation of online file storage services, referred to generically by such terms as “cloud storage” or “web storage” services, “webhards,” or “cyberlockers.” A wide range of sites and services fall into this category, including Amazon’s Cloud Drive, Apple’s iCloud, Microsoft’s SkyDrive, Google Drive, Dropbox, Rapidshare, MediaFire, and Filesonic. The specific features, intended uses, and target markets for these services vary widely; some are designed and marketed primarily for data backup or for access to personal files while traveling, while some are focused more on facilitating transfers of large data files to others. Many provide substantial amounts of storage for free. The capability of cyberlocker services to disseminate large media files has led to their use in large scale piracy of movies, music, software, and other copyrighted works. Although the use of cyberlockers to infringe copyright is a relatively recent trend, the same principles apply to cyberlockers as to other types of online infringement. Individual users of cyberlockers who make use of cyberlockers to reproduce, distribute, or otherwise infringe copyright willfully may be prosecuted criminally, provided the other elements of the criminal copyright statute (e.g., minimum numeric and monetary thresholds; commercial advantage or private financial gain; online distribution of pre-release works) are met. Operators of cyberlockers may also be subject to prosecution for criminal copyright infringement where they willfully distribute or disseminate infringing content, or under theories of aiding and abetting or conspiracy to commit criminal copyright infringement. See 18 U.S.C. §§ 2, 371. 78 Prosecuting Intellectual Property Crimes To the extent that cyberlockers are used to distribute large media files to a group or to the public, they function much like popular user-generated content (“UGC”) sites like YouTube or Vimeo. However, a common feature that generally distinguishes cyberlockers from UGC sites is that cyberlockers are generally not designed to be searchable by outside users or the web-crawlers used by search engines to index publicly-available content on the Internet. On many cyberlocker sites, the only way to access a particular file is to know the specific URL or address where the file is located (e.g., a complex and difficultto-guess address such as, “http://www.cyberlocker.com/xyzcvbRT1908973”). Partly as a result, an ecosystem of “linking sites” has developed that compile and categorize links to media files located on cyberlocker sites (as well as BitTorrent or other links to P2P networks), enabling users to search for and locate particular files, including pirated media content. Many of these linking sites are supported by advertising, and some may also receive affiliate commissions in exchange for driving traffic to a cyberlocker or other content-hosting site. The fact that a “pure” linking site does not host infringing content itself may present additional challenges to criminal prosecution. Most courts that have addressed the issue in civil cases have held that merely providing links to infringing content does not violate the distribution right or otherwise constitute direct copyright infringement (although such conduct may still result in secondary liability under a theory of contributory or vicarious infringement). See, e.g., Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146 (2007); Online Policy Grp. v. Diebold, Inc., 337 F. Supp. 2d 1195, 1202 n.12 (N.D. Cal. 2004) (“[H]yperlinking per se does not constitute direct copyright infringement because there is no copying.”); Arista Records, Inc. v. MP3Board, Inc., No. 00 CIV 4660 (SHS), 2002 WL 1997918, at *4 (S.D.N.Y. Aug. 29, 2002) (linking to content does not violate the distribution right or constitute direct infringement). The extent to which merely linking to infringing content hosted by other sites may constitute criminal copyright infringement under 17 U.S.C. § 506 has not been conclusively resolved by the courts. Regardless of whether linking itself amounts to a substantive violation of § 506, however, defendants who facilitate infringement by others by providing links to infringing material online may nevertheless by prosecuted under theories of aiding and abetting (18 U.S.C. § 2) or conspiracy (18 U.S.C. § 371), provided that the other requisite elements of criminal infringement (e.g., willfulness, numeric and monetary thresholds, online distribution of pre-release work) can be shown. II. Criminal Copyright Infringement 79 E. Penalties 1. Statutory Penalties Whereas the substantive crime of copyright infringement is set forth at 17 U.S.C. § 506(a), the penalties for that conduct are set forth at 18 U.S.C. § 2319. See 17 U.S.C. § 506(a) (“Any person who willfully infringes a copyright shall be punished as provided under section 2319 of title 18.”). A misdemeanor carries a sentence of up to one year of imprisonment and a $100,000 fine or twice the monetary gain or loss. See 18 U.S.C. §§ 2319(b) (3),(c)(3), 3571(b)(5), (d). For the crimes that qualify as misdemeanors, see Section B.5. of this Chapter. A first-time felony conviction under 17 U.S.C. § 506(a)(1)(A) carries a fiveyear maximum sentence of imprisonment and a fine up to $250,000 or twice the monetary gain or loss; repeat offenders face the same fine and ten years of imprisonment. 18 U.S.C. §§ 2319(b)(1),(2), 3571(b)(3),(d) (specifying fines for Title 18 offenses where the fine is otherwise unspecified). A first-time felony conviction under 17 U.S.C. § 506(a)(1)(B) carries a three-year maximum sentence of imprisonment and a fine up to $250,000 or twice the monetary gain or loss; repeat offenders face the same fine and six years’ imprisonment. 18 U.S.C. §§ 2319(c)(1),(2), 3571(b)(3),(d). A first-time felony conviction under 17 U.S.C. § 506(a)(1)(C) carries a three-year maximum sentence—five years if the offense was committed for purposes of commercial advantage or private financial gain—and a fine of $250,000 or twice the monetary gain or loss; repeat offenders face the same fine and twice the jail time (six or ten years, depending on whether the offense was committed for purposes of profit). 18 U.S.C. §§ 2319(d), 3571(b)(3), (d). 2. Sentencing Guidelines All sentencing guideline issues concerning the criminal copyright statute are covered in Chapter VIII of this Manual. 80 Prosecuting Intellectual Property Crimes F. Other Charges to Consider Prosecutors may wish to consider the following crimes in addition to or in lieu of criminal copyright charges. • Aiding-and-abetting, inducement, and conspiracy Prosecutors may, for strategic reasons, wish to bring accessory charges, such as aiding-and-abetting or inducement, 18 U.S.C. § 2, or conspiracy, 18 U.S.C. § 371. See, e.g., United States v. Sachs, 801 F.2d 839 (6th Cir. 1986) (affirming conviction for aiding-and-abetting and conspiring to infringe in motion picture copyright infringement case); United States v. Allan, No. 95CR-578-01, 2001 WL 1152925 (E.D. Pa. Sept. 18, 2001) (denying motion to vacate sentence on defendant’s convictions for, among other things, copyright infringement, aiding-and-abetting, and conspiracy). Aiding-and-abetting and inducement of criminal copyright infringement under 18 U.S.C. § 2 are similar to the “inducement” theory of secondary liability the Supreme Court recently endorsed in Metro Goldwyn-Mayer Studios, Inc. v. Grokster, 545 US 913 (2005). Although Grokster was a civil case, further decisions in the case on remand, as well as subsequent civil litigation on the same topic, will likely provide further guidance on how an inducement theory may be applied in criminal copyright cases. • Trafficking in recordings of live musical performances, 18 U.S.C. § 2319A As discussed in Section B.1.a.i. of this Chapter, a work must be fixed in a tangible medium in order to enjoy copyright protection. Thus, live musical performances are not protected by copyright unless they are “fixed” by an audio recording authorized by the performer. However, the law provides copyrightlike protections for live musical performances by prohibited unauthorized recordings of such performances, and trafficking in such recordings. See 17 U.S.C. § 1101 (providing civil remedies); 18 U.S.C. § 2319A (criminal sanctions). These protections were enacted in 1994 in part to comply with obligations under international copyright treaties that require protection for musical performances. See Uruguay Round Agreements Act, Pub. L. No. 103465, 108 Stat. 4809 (1994). Specifically, 18 U.S.C. § 2319A(a) subjects to criminal sanctions: [w]hoever, without the consent of the performer or performers involved, knowingly and for purposes of commercial advantage II. Criminal Copyright Infringement 81 or private financial gain - (1) fixes the sounds or sounds and images of a live musical performance in a copy or phonorecord, or reproduces copies or phonorecords of such a performance from an unauthorized fixation; (2) transmits or otherwise communicates to the public the sounds or sounds and images of a live musical performance; or (3) distributes or offers to distribute, sells or offers to sell, rents or offers to rent, or traffics in any copy or phonorecord fixed as described in paragraph (1), regardless of whether the fixations occurred in the United States. Although some unauthorized recordings or trade in unauthorized recordings might be prosecuted as infringement of the underlying musical composition performed in the recording, § 2319A specifically targets the making and distribution of these so-called “bootlegged” musical recordings. Each of § 2319A’s three subsections protects a different right of the performing artist. Paragraph (a)(1) prohibits fixing the sounds or images of a live musical performance in a tangible medium. See 17 U.S.C. § 101 (defining fixation). But see United States v. Moghadam, 175 F.3d 1269, 1274 (11th Cir. 1999) (declining to decide whether a live performance is fixed at the time of performance). Paragraph (a)(2) prohibits transmitting the sounds or images of a live musical performance to the public. This subsection was intended to apply to the unauthorized transmission of bootleg performances through radio or television, and not to the unauthorized reproduction of previously recorded but unreleased performances, i.e., studio out-takes. The latter should be considered for prosecution as criminal copyright infringement or, if labeled, trafficking in counterfeit labels, documentation, or packaging. See Chapter VI of this Manual. Paragraph (a)(3) prohibits distributing to the public or trafficking in any fixed recording of a live musical performance. Under each subsection, the government must also prove that the defendant acted: (1) without authorization from the performer involved; (2) knowingly; and (3) for purposes of commercial advantage or private financial gain. See Section B.4. of this Chapter for a detailed discussion of the commercial motivation element. Section 2319A is a five-year felony (ten years for repeat offenders) with a fine of $250,000 or twice the monetary gain or loss, see 18 U.S.C. §§ 2319A(a), 3571(b)(3),(d), and is sentenced under the same guideline as are copyright 82 Prosecuting Intellectual Property Crimes crimes, U.S.S.G. § 2B5.3. The statute provides for mandatory forfeiture and destruction of all infringing items upon a defendant’s conviction. See 18 U.S.C. § 2319A(b),(c). Further, a violation of § 2319A is listed in 18 U.S.C. § 1961(1) (B) as a RICO predicate. It was inserted into RICO by the Anticounterfeiting Consumer Protection Act, Pub. L. No. 104-153 § 3, 110 Stat. 1386 (1996). The constitutionality of 18 U.S.C. § 2319A (and the related civil statute, 17 U.S.C. § 1101) has been challenged several times on the grounds that in the area of copyright Congress may regulate only “writings” and only for “limited times,” see U.S. Const., art. I, § 8, cl. 8, and that § 2319A (which has no time limit and applies to live performances) exceeds those limits. Although these challenges have occasionally prevailed at the district court level, the constitutionality of the statute has ultimately been upheld upon rehearing or by the Courts of Appeals. See United States v. Martignon, 492 F.3d 140 (2d Cir. 2007); Moghadam, 175 F.3d at 1274-77; Kiss Catalog, Ltd. v. Passport Int’l Prods., Inc., 405 F. Supp. 2d 1169 (C.D. Cal. 2005). Many states also criminalize trafficking in bootleg recordings. • Unauthorized recording of motion pictures in a motion picture exhibition facility (“Camcording”), 18 U.S.C. § 2319B The Family Entertainment and Copyright Act of 2005, Pub. L. No. 1099, 119 Stat. 218 (enacted April 27, 2005), created a criminal offense that targets “camcording,” the use of camcorders and similar devices to record movies playing in public movie theaters. “Camcorded” copies of movies are a significant source of pirated movies, and sales of camcorded copies of movies can be especially harmful to copyright owners, because they typically are created and distributed when the movie is available only in theaters and not on DVD or other formats. H.R. Rep. No. 109-33(I) (2005), reprinted in 2005 U.S.C.C.A.N. 220. In addition to the federal camcording offense in § 2319B, most states and the District of Columbia also provide criminal penalties for unauthorized camcording. The elements of an offense under 18 U.S.C. § 2319B are that the defendant (1) knowingly, and (2) without the authorization of the copyright owner, (3) used or attempted to use an audiovisual recording device, (4) to transmit or make a copy of a motion picture or other audiovisual work protected under Title 17, (5) from a performance of such work in a motion picture exhibition facility. 18 U.S.C. § 2319B(a). The maximum punishment for the offense is three years (six years for repeat offenders). Id. II. Criminal Copyright Infringement 83 Section 2319B’s mens rea requirement is lower than the “willfulness” requirement for criminal copyright offenses: a § 2319B defendant need only act “knowingly.” Additionally, it is not necessary to show infringement of a copyright. Rather, the government need only show that the defendant was transmitting or copying (or attempting to transmit or copy) a copyrighted motion picture without the copyright owner’s permission. Although the defenses to infringement set forth in Title 17 would not apply to a prosecution under 18 U.S.C. § 2319B, the statute’s legislative history indicates that Congress intended prosecutors to avoid prosecuting cases that would be deemed “fair use” under copyright law. See H.R. Rep. No. 109-33(I), at 4. An “audiovisual recording device” is defined as a “digital or analog photographic or video camera, or any other technology or device capable of enabling the recording or transmission of a copyrighted motion picture or other audiovisual work, or any part thereof, regardless of whether audiovisual recording is the sole or primary purposes of the device.” 18 U.S.C. § 2319B(g) (2). This would appear to apply to camera-phones, PDA phones, and digital cameras (especially those capable of recording video). Congress, however, intended that the offense should not cover incidental uses of these devices in a theater, even though such uses could violate other statutes (such as the copyright laws). See H.R. Rep. No. 109-33(I), at 2-3. The offense applies only to camcording in a “motion picture exhibition facility,” which is defined by reference to that same term in 17 U.S.C. § 101: “a movie theater, screening room, or other venue that is being used primarily for the exhibition of a copyrighted motion picture, if such exhibition is open to the public or is made to an assembled group of viewers outside of a normal circle of a family and its social acquaintances.” The term includes commercial movie theaters and may also apply to generally non-public or quasi-public spaces such as a university auditorium, but only when such a venue is being used as a “public” exhibition facility at the time of the offense. See H.R. Rep. No. 109-33(I), at 3, reprinted in 2005 U.S.C.C.A.N. 222 (stating that “open to the public” is intended to refer to the particular exhibition rather than the venue generally). • Trafficking in counterfeit and illicit labels, and counterfeit documentation and packaging, 18 U.S.C. § 2318 This is covered in Chapter VI of this Manual. 84 Prosecuting Intellectual Property Crimes • Trafficking in goods and services with counterfeit trademarks, service marks, and certification marks, 18 U.S.C. § 2320 See Chapter III of this Manual. • Digital Millennium Copyright Act (DMCA), 17 U.S.C. §§ 12011204 The DMCA provides criminal penalties for dismantling the electronic locks that are intended to prevent people from accessing or copying copyrighted works without permission, for trafficking in “electronic lockpicks,” and for falsifying or removing copyright management information. See Chapter V of this Manual. • Unauthorized reception of cable and 47 U.S.C. §§ 553, 605 and 18 U.S.C. § 2511 satellite • Economic Espionage Act, 18 U.S.C. §§ 1831-1839 service, For stealing trade secrets, whether copyrighted or not, see Chapter IV of this Manual. • Mail and wire fraud, 18 U.S.C. §§ 1341, 1343, 1346 Although fraud schemes can involve copyrighted works, prosecutors should be wary of charging mail or wire fraud as a substitute for a criminal copyright charge in the absence of evidence of any misrepresentation or scheme to defraud. In one copyright case, in which a wire fraud charge was brought because the facts were insufficient to support a criminal copyright charge, no misrepresentation was alleged, and the district court dismissed the charge. See United States v. LaMacchia, 871 F. Supp. 535 (D. Mass. 1994). The judge in LaMacchia reasoned that the bundle of rights conferred by copyright is unique and carefully defined, precluding prosecution under the general wire fraud statute, at least when there is no fraudulent conduct on the part of the defendant. Id. at 544-45. The court in LaMacchia relied heavily on the Supreme Court’s decision in Dowling v. United States, 473 U.S. 207 (1985). In Dowling, the Court overturned the defendant’s conviction for interstate transportation of stolen property under 18 U.S.C. § 2314 because it found Congress’ actions to be preemptive. See Dowling, 473 U.S. at 207; see also 4 Nimmer on Copyright § 15.05[A] at 15-34 (1999) (“Dowling’s lesson is that Congress has finely calibrated the reach of criminal copyright liability, and therefore, absent clear indication of Congressional intent, the criminal laws of the United States do not reach copyright-related conduct.”). II. Criminal Copyright Infringement 85 While LaMacchia suggests that courts are unlikely to be receptive to a wire or mail fraud charge brought as a substitute for a criminal copyright charge in a case where some element of the criminal copyright charges is missing, wire or mail fraud charges may still be viable and appropriate in infringement cases that involve actual misrepresentations or schemes to defraud. Cf. United States v. Manzer, 69 F.3d 222, 226 (8th Cir. 1995) (holding that sale to a third party of illegal cable television descrambling devices violated federal fraud statutes); United States v. Coyle, 943 F.2d 424, 427 (4th Cir. 1991) (holding sale of cable television descramblers to be a scheme to defraud “because it wronged the cable companies in their ‘property rights by dishonest methods or schemes’”) (quoting United States v. McNally, 483 U.S. 350, 358 (1987)). Nevertheless, in the absence of strong evidence of misrepresentation, prosecutors should avoid a wire or mail fraud charge if an infringement crime can be proved. For a more detailed discussion of 18 U.S.C. §§ 1341 and 1343, refer to USAM Chapter 9-43.000. The Criminal Division’s Fraud Section at (202) 514-7023 can provide further information and guidance. • Interstate transportation and receipt of stolen property or goods, 18 U.S.C. §§ 2314-2315 The Interstate Transportation of Stolen Property Act (“ITSP”) punishes “[w]hoever transports, transmits, or transfers in interstate or foreign commerce any goods, wares, merchandise, securities or money, of the value of $5,000 or more, knowing the same to have been stolen, converted or taken by fraud,” 18 U.S.C. § 2314, and “[w]hoever receives, possesses, conceals, stores, barters, sells, or disposes” stolen property that has crossed a state or federal boundary, 18 U.S.C. § 2315. Although ITSP can be used under certain circumstances to prosecute theft of proprietary information or other types of intellectual property, the Supreme Court has rejected the use of the ITSP statute to prosecute copyright infringement cases, at least when the infringement does not involve the actual theft of a tangible good. Dowling v. United States, 473 U.S. 207 (1985). In Dowling, the Court reversed a conviction for the interstate transportation of infringing copies of Elvis Presley records, holding that Congress did not intend § 2314 to criminalize copyright infringement. The Court reasoned that a copyright infringer neither assumed physical control over the copyright nor wholly deprived the owner of its use. The statute “seems clearly to contemplate a physical identity between the items unlawfully obtained and those eventually 86 Prosecuting Intellectual Property Crimes transported, and hence [requires] some prior physical taking of the subject goods.” Id. at 216. Despite Dowling, an ITSP charge may be appropriate for acts of infringement that involve the actual transportation of tangible objects across state lines. For more on these issues, see Section F. of Chapter IV of this Manual. • Racketeer Influenced and Corrupt Organizations Act (RICO), 18 U.S.C. §§ 1961-1968 The criminal copyright and bootleg recordings of live music performances offenses are RICO predicates. See 18 U.S.C. § 1961(1)(B). RICO charges must be approved by the Department’s Organized Crime and Gang Section, which can be reached at (202) 514-3594. • Money laundering, 18 U.S.C. § 1956 Criminal copyright infringement is a specified unlawful activity for purposes of the money laundering statute. See 18 U.S.C. § 1956(c)(7)(D). II. Criminal Copyright Infringement 87 88 Prosecuting Intellectual Property Crimes III. Trafficking In Counterfeit Trademarks, Service Marks, and Certification Marks— 18 U.S.C. § 2320 A. Introduction 1. Overview Trademarks and service marks are part of the fabric of American society. They are on our clothes, our cars, and nearly everything else we buy; they are advertised on the street, in magazines, on television and websites, and especially in stores. They are protected not only by civil law, but also by the criminal counterfeit marks statute first enacted in 1984, 18 U.S.C. § 2320. A trademark is “any word, name, symbol, or device, or any combination thereof ... used by a person ... to identify and distinguish his or her goods ... from those manufactured or sold by others and to indicate the source of the goods.” 15 U.S.C. § 1127. A service mark, by contrast, identifies the source of services rendered or offered, such as athletic events, television shows, restaurant services, telecommunications services, or retail business services, rather than goods. Id. Examples of well-known trademarks include Kodak®, Apple®, Microsoft®, Coca-Cola®, GE®, Life-Savers®, USA Today®, KLEENEX®, the color pink for Owens Corning fiberglass, and the NBC chime. Well-known service marks include Merry Maids®, Greyhound®, Wal-Mart®, Taco Bell®, Burger King®, and McDonald’s®. Two other types of marks are protected by 18 U.S.C. § 2320: certification and collective marks. A certification mark is used to certify characteristics of goods or services, including regional or other origin, material, mode of manufacture, quality, and accuracy. Certification marks are also used to certify that the work or labor on the goods or services was performed by members of 89 a union or other organization. 15 U.S.C. § 1127. Examples of certification marks include Underwriters Laboratories’ UL® mark, which certifies the safety standards of electrical cable equipment, and the Woolmark® symbol, which certifies that certain laundry products can wash and dry wool and wool-blend products without damage. These marks indicate that authorized persons will manufacture the products in accordance with the mark-holder’s processes. A collective mark is a trademark or service mark used by an association, union, or other group either to identify the group’s products or services, or to signify membership in the group. Id. PGA®, Realtor®, and AFL-CIO® are examples of collective marks. As is discussed in more detail below, the law protects marks from infringement because they are important to businesses and for consumer protection. Americans rely on the brands these marks represent when deciding which goods and services to purchase and use. This gives companies a strong incentive to control the quality of their goods and services and to invest heavily in their brands. One who infringes a mark often misleads consumers, diverts sales from the mark’s owner, and misrepresents to the public the quality of the marked products and services. Criminal prosecution is appropriate for the most egregious infringers. This Chapter first discusses the functions protected by trademarks, service marks, and certification marks. It then discusses the criminal counterfeiting statute and the elements of the crime, as well as common defenses, issues unique to this crime, and related statutory penalties. Sample indictments and jury instructions are provided in Appendix C. The criminal counterfeit marks statute, 18 U.S.C. § 2320, and its associated statutes, have undergone several significant amendments since 2005. The Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1, 120 Stat. 285, 285-88 (2006) and the Protecting American Goods and Services Act of 2005, Pub. L. No. 109-181, § 2, 120 Stat. 285, 288 (2006) (the “2006 amendments”), effective March 16, 2006, expanded and clarified the definition of “trafficking,” and added language criminalizing trafficking in labels and packaging bearing counterfeit marks, even where those labels are unattached to actual goods. The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act, Pub. L. No. 110-403, 122 Stat. 4256, 4261-63 (2008), effective October 13, 2008, further amended § 2320 and associated statutes addressing 90 Prosecuting Intellectual Property Crimes counterfeiting, by (i) enhancing penalties for knowingly or recklessly causing or attempting to cause serious bodily injury or death, 18 U.S.C. § 2320(a)(2) (A) and (B) [now § 2320(b)(2)(A) and (B)]; (ii) prohibiting transshipment or exportation of goods or services, the trafficking of which was already prohibited by 18 U.S.C. § 2320(h) [now § 2320(i)]; and (iii) harmonizing forfeiture and restitution provisions under 18 U.S.C. §§ 2323 and 2320(b) [now § 2320(c)]. Most recently, the National Defense Authorization Act (NDAA) for Fiscal Year 2012, Pub. L. No. 112-81, 125 Stat. 1298 (2011), H.R. 1540, S. 1867, enacted December 31, 2011, and the Food and Drug Administration Safety and Innovation Act (FDASIA), Pub. L. No. 112-144, 126 Stat. 993, S. 3197, enacted July 9, 2012, included a number of substantial amendments to § 2320. For example, the NDAA, in § 818, amended § 2320 to include new, enhanced penalties for certain offenses involving “counterfeit military goods,” a new category also defined in the NDAA. Section 2320 also now provides an express conspiracy provision, so that conspiracies to traffic in counterfeit goods may be prosecuted under § 2320 alone, rather than in conjunction with 18 U.S.C. § 371. In addition to these substantive changes to § 2320, the NDAA also restructured the offense language in § 2320(a). The FDASIA amended § 2320 to create a new offense for “trafficking in counterfeit drugs,” and included new, enhanced penalties for this offense. See FDASIA § 717. Prosecutors should consult the text of § 2320 carefully to ensure that they are applying the law in effect at the time of the offense. Particularly in light of the recent restructuring of § 2320(a), prosecutors should be mindful that previously-used charging instruments, jury instructions, and other documents drafted prior to 2012 may use slightly different statutory language or numbering than is currently applicable. For example, the definition of “counterfeit mark” previously found in § 2320(e)(1) is now found in § 2320(f )(1). In addition to this Chapter, prosecutors may refer to the leading treatise on trademark law, J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition (4th ed. 2012), as well as other helpful law review articles and treatises such as Ronald D. Coenen Jr. et. al., Intellectual Property Crimes, 48 Am. Crim. L. Rev. 849 (2011); Louis Altman & Malla Pollack, Callmann on Unfair Competition, Trademarks and Monopolies, 4 Callmann on Unfair Comp., T. & Mono. § 22:33 (4th ed. 2012); and David J. Goldstone & Peter J. Toren, The Criminalization of Trademark Counterfeiting, 31 Conn. L. Rev. 1 (1998). Although § 2320 criminalizes the infringement of trademarks, service marks, and certification marks, for ease of discussion this Manual often refers III.Trafficking In Counterfeit Marks 91 primarily to trademarks and sales of goods. The legal analysis should, however, apply equally to service and certification marks as well. 2. Why Criminal Law Protects Trademarks, Service Marks, and Certification Marks Trademarks and service marks serve at least four functions: 1. They identify a particular seller’s goods or services and distinguish them from those sold by others. 2. They signify that all goods or services bearing the mark come from or are controlled by a single source. 3. They signify that all goods or services bearing the same mark are of an equal level of quality. 4. They serve as a primary method to advertise and sell goods and services. See 1 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition § 3:2 (4th ed. 2012). A trademark or service mark also serves as an important “objective symbol of the good will that a business has built up. Without the identification function performed by trademarks, buyers would have no way of returning to buy products that they have used and liked.” Id. Certification marks are intended to “certify regional or other origin, material, mode of manufacture, quality, accuracy or other characteristics of such person’s goods or services.” 15 U.S.C. § 1127. Because “penalties under [the civil Lanham] Act have been too small, and too infrequently imposed, to deter counterfeiting significantly,” much of the conduct that formerly had been subject only to civil penalties was criminalized through the enactment of the Trademark Counterfeiting Act of 1984, Pub. L. No. 98-473, 98 Stat. 2178 (1984), (codified at 18 U.S.C. § 2320). See S. Rep. No. 98-526, at 5 (1984), reprinted in 1984 U.S.C.C.A.N. 3627, 3631. The criminalization of trademark counterfeiting serves at least four important purposes: a. Protecting a mark-holder’s intellectual property from theft or dilution Stealing a company’s name or brand name is a type of corporate identity theft. See H.R. Rep. No. 109-68, at 8 n.2 (2005) (“Congress was concerned ... that counterfeiters can earn enormous profits by capitalizing on the reputations, development costs, and advertising efforts of honest manufacturers at little expense to themselves.”) (alterations in original and internal quotation marks omitted) (legislative history to Stop Counterfeiting in Manufactured Goods 92 Prosecuting Intellectual Property Crimes Act, Pub. L. No. 109-181, § 1, 120 Stat. 285 (2006)) (citing United States v. Hon, 904 F.2d 803, 806 (2d Cir. 1990) and S. Rep. No. 98-526, at 4-5 (1984), reprinted in 1984 U.S.C.C.A.N. 3627, 3630-31). A counterfeiter should no more be able to steal a company’s good name (and the profits associated with its name) than the company’s money or other assets. Diane Kiesel, Battling the Boom in Bogus Goods, 71-MAR A.B.A.J. 60 (1985). Also, by selling inferior products, the counterfeiter may devalue a mark-holder’s good name even while profiting from it. Id. at 61. b. Protecting consumers from fraud When consumers decide what goods to buy, they should be able to rely on individual goods’ trademarks and the quality those marks purport to represent. See H.R. Rep. No. 109-68, at 8 n.2 (“Congress was concerned not only that trademark counterfeiting defrauds purchasers, who pay for brand-name quality and take home only a fake...”) (alterations in original and internal quotation marks omitted) (citing Hon, 904 F.2d at 806 and S. Rep. No. 98-526, at 4-5); Note, Badwill, 116 Harv. L. Rev. 1845 (2003). Counterfeit marks can mislead consumers. They give the ring of authenticity to goods of lower quality. They can even mask serious health or safety risks to consumers, as in the cases of counterfeit food products, batteries, prescription drugs, or automotive parts. S. Rep. No. 98-526, at 4-5. Trademark counterfeiting can also be difficult to regulate civilly. With a large number of victims across a potentially large geographic region—especially in the case of goods offered online—and small losses per victim, a large-scale counterfeiter can often evade civil sanctions. c. Protecting the safety of non-purchasing users Sales of counterfeit products can hurt not only the trademark holder and the initial purchaser, but also third parties who use the goods or services after the initial purchase. For example, airline passengers are victims of counterfeit airplane parts, coronary patients are victims of counterfeit heart pumps, and children are victims of counterfeit infant formula, even though in each case the counterfeit goods were purchased for those consumers’ benefit by another person. These are some of the types of situations that Congress sought to eradicate by criminalizing trademark infringement. See H.R. Rep. No. 104556, at 3 (1996), reprinted in 1996 U.S.C.C.A.N. 1074, 1076; S. Rep. No. 98-526, at 4-5. III.Trafficking In Counterfeit Marks 93 d. Enforcing market rules Just as counterfeiting money and forging financial instruments undermine fundamental rules of the marketplace, counterfeiting trademarks weakens modern commercial systems. David J. Goldstone & Peter J. Toren, The Criminalization of Trademark Counterfeiting, 31 Conn. L. Rev. 1, 17-19 (1998). B. Elements 1. The Trademark Counterfeiting Crime in General The Trademark Counterfeiting Act, 18 U.S.C. § 2320(a), states: (a) Offenses.— Whoever intentionally— (1) traffics in goods or services and knowingly uses a counterfeit mark on or in connection with such goods or services, (2) traffics in labels, patches, stickers, wrappers, badges, emblems, medallions, charms, boxes, containers, cans, cases, hangtags, documentation, or packaging of any type or nature, knowing that a counterfeit mark has been applied thereto, the use of which is likely to cause confusion, to cause mistake, or to deceive, (3) traffics in goods or services knowing that such good or service is a counterfeit military good or service the use, malfunction, or failure of which is likely to cause serious bodily injury or death, the disclosure of classified information, impairment of combat operations, or other significant harm to a combat operation, a member of the Armed Forces, or to national security, or (4) traffics in a counterfeit drug, or attempts or conspires to violate any of paragraphs (1) through (4) shall be punished as provided in subsection (b). In contrast to criminal copyright thresholds, selling just one counterfeit item can be a felony. United States v. Foote, 413 F.3d 1240, 1246 (10th Cir. 2005). There is no misdemeanor provision. 94 Prosecuting Intellectual Property Crimes Thus, to establish a criminal offense under 18 U.S.C. § 2320(a)(1)-(3), the government must prove the following elements: 1. The defendant intentionally trafficked or attempted or conspired to traffic in goods or services (or labels, documentation or packaging for goods or services); and 2. The defendant knowingly used a counterfeit mark on or in connection with those goods or services, or a counterfeit mark was applied to labels, documentation, or packaging for those goods or services. The elements above apply to all offenses under § 2320, whether under subsection (1), (2), or (3). To prove an offense under the military counterfeits provision, § 2320(a)(3), the government must also prove the following two elements: 3. The good or service bearing a counterfeit mark is a “counterfeit military good or service,” meaning that the good or service is: a. falsely identified or labeled as meeting military specifications, or b. intended for use in a military or national security application; and 4. The use, malfunction, or failure of the good or service is likely to cause one or more of the following: a. serious bodily injury or death, b. the disclosure of classified information, c. impairment of combat operations, or d. other significant harm to a combat operation, a member of the Armed Forces, or to national security. With respect to the counterfeit drug provision, § 2320(a)(4), this provision makes it an offense to intentionally traffic or attempt or conspire to traffic in a “counterfeit drug”; “counterfeit drug” is defined in § 2320(f )(6) as a drug “that uses a counterfeit mark on or in connection with the drug.” Congress, however, inadvertently did not include the requirement that the government must prove that the defendant knowingly used a counterfeit mark on or in connection with the drug. As of this writing, Congress has not amended this provision to correct the omission of this requirement. If prosecutors seek to bring a case under § 2320(a)(4), it would be prudent for prosecutors to prove that the defendant knowingly used a counterfeit mark on or in connection with the drug, just as they would prove the mens rea for § 2320(a)(1)–(3). This approach is consistent with the legislative intent. Alternatively, prosecutors can continue to use § 2320(a)(1) to charge cases involving the knowing use of a counterfeit mark on drugs as such drugs still constitute “goods.” Prosecutors can contact III.Trafficking In Counterfeit Marks 95 CCIPS at (202) 514-1026 to obtain the latest guidance with respect to the counterfeit drug provision. In addition to the elements of the offense, the government must also show in all cases that the counterfeit mark meets the definition of a counterfeit mark as set forth in § 2320(f ). To meet the definition of a counterfeit mark, the government must show that: 1. The counterfeit mark was not genuine or authentic; 2. The counterfeit mark was identical to or substantially indistinguishable from a genuine mark owned by another; 3. The genuine mark was registered on the principal register in the United States Patent and Trademark Office; 4. The genuine mark had been in use by the mark-holder or its licensee; 5. The counterfeit mark was used “on or in connection with” the defendant’s goods or services (or in the case of labels and packaging, the counterfeit mark was “applied to or used in connection with” the goods or services or was “applied to or consist[ed] of ” labels, documentation, or packaging “of any type or nature”); 6. The counterfeit mark was used “in connection with” the type of goods or services for which the protected mark was registered, (or in the case of labels and packaging, the counterfeit labels, documentation, or packaging were “designed, marketed, or otherwise intended to be used on or in connection with the goods or services for which the mark [was] registered”); and 7. The counterfeit mark was used in a manner “likely to cause confusion, to cause mistake, or to deceive.” These elements and definition are discussed in detail below. 2. Relevance of Civil Trademark Law in Criminal Counterfeiting Cases When Congress drafted § 2320, it relied on the “concepts and definitions of the Lanham Act,” the civil trademark statute codified at 15 U.S.C. §§ 10511127. See H.R. Rep. No. 98-997, at 4-5 (1984). The Lanham Act’s defenses and limitations on remedies are specifically incorporated into § 2320, see 18 U.S.C. § 2320(d), (f )(3), and are discussed in Section C.4. of this Chapter. Moreover, Congress repeatedly indicated that the Lanham Act was the background against which § 2320 should be interpreted. See, e.g., Joint Statement on Trademark Counterfeiting Legislation, 130 Cong. Rec. 31,675 (1984) (hereinafter “Joint 96 Prosecuting Intellectual Property Crimes Statement”) (“No conduct will be criminalized by this act that does not constitute trademark infringement under the Lanham Act.”). Given this legislative history, courts deciding criminal cases under § 2320 have often turned to civil opinions decided under the Lanham Act. For example, the Ninth Circuit affirmed a defendant’s § 2320 conviction by relying not only on the criminal statute’s legislative history, but also on two civil Lanham Act cases. The court noted that the “definition of the term ‘counterfeit mark’ in the Lanham Act is nearly identical to the definition [of counterfeit mark] in Section 2320, suggesting that Congress intended to criminalize all of the conduct for which an individual may be civilly liable.” United States v. Petrosian, 126 F.3d 1232, 1234 (9th Cir. 1997); see also 15 U.S.C. §§ 1116(d) (defining “counterfeit mark” in civil actions), 1127 (defining “counterfeit”). Similarly, the Eleventh Circuit held that the “likely to cause confusion, mistake or deceive” test within the definition of counterfeit mark at 18 U.S.C. § 2320(f )(1)(A) (iii) extends beyond direct purchasers to encompass the purchasing public and potential purchasers based on the “identical language” in the Lanham Act and the legislative history. United States v. Torkington, 812 F.2d 1347, 1352 (11th Cir. 1987) (“Congress ... manifested its intent that [§ 2320] be given the same interpretation as is given the identical language in [§] 1114(1) of the Lanham Act”). Despite the civil and criminal laws’ many similarities, some courts have held that their differences sometimes merit distinction. See United States v. Hanafy, 302 F.3d 485, 488 (5th Cir. 2002) (holding that Lanham Act cases “should not be used as authoritative in interpreting a criminal statute”); United States v. Giles, 213 F.3d 1247, 1249-50 (10th Cir. 2000) (declining to follow a civil case in part because § 2320, as a criminal statute, must be construed more narrowly); Torkington, 812 F.2d at 1350 (noting that § 2320 is “narrower in scope” than the Lanham Act). 3. Intentionally Trafficked in Goods or Services (or Labels, Documentation, or Packaging for Goods or Services) Section 2320(a) requires the government to prove that the defendant “intentionally” trafficked in goods or services or in “labels, patches, stickers, wrappers, badges, emblems, medallions, charms, boxes, containers, cans, cases, hangtags, documentation, or packaging of any type or nature,” or attempted or conspired to do so. 18 U.S.C. § 2320(a)(1), (2). III.Trafficking In Counterfeit Marks 97 a. Intentionally The term “intentionally” modifies “traffics.” See Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1, 120 Stat. 285, 285-87 (2006); United States v. Baker, 807 F.2d 427, 429 (5th Cir. 1986) (quoting legislative history’s breakdown of § 2320’s two mens rea elements). It means “that the defendant trafficked in the goods or services in question deliberately, or ‘on purpose.’” See Joint Statement, 130 Cong. Rec. 31,674 (1984). As a general intent crime, the government need not prove that the defendant specifically intended to violate 18 U.S.C. § 2320 or even that he knew his conduct was illegal. Baker, 807 F.2d at 427-30; United States v. Gantos, 817 F.2d 41, 42-43 (8th Cir. 1987) (affirming district court’s refusal to instruct jury that § 2320 required proof that defendant knew that his act violated the law). b. Trafficked i. General Definition “Traffic” is broadly defined in § 2320(f )(5) to mean “to transport, transfer, or otherwise dispose of, to another, for purposes of commercial advantage or private financial gain, or to make, import, export, obtain control of, or possess, with intent to so transport, transfer, or otherwise dispose of.” The current definition resolves some difficulties that arose from earlier definitions used in the statute, which turned on the meaning of “consideration.” Prior to March 16, 2006, “traffic” was defined somewhat more narrowly, in what was then subsection (e)(2) of 18 U.S.C. § 2320 to mean “transport, transfer, or otherwise dispose of, to another, as consideration for anything of value, or make or obtain control of with intent so to transport, transfer, or dispose of.” That definition was intended to be broad, covering all aspects of commercial activity from initial manufacture to distribution and sale, but it was not intended to cover purchases for personal use. See Joint Statement, 130 Cong. Rec. 31,675 (1984); S. Rep. No. 98-526 (1984), reprinted in 1984 U.S.C.C.A.N. 3627; David J. Goldstone & Peter J. Toren, The Criminalization of Trademark Counterfeiting, 31 Conn. L. Rev. 1 (1998). A defendant who did not personally “transport[], transfer[], or otherwise dispose[]” of the goods but who aided and abetted a co-conspirator who did traffic could be convicted as an aider-and-abettor. See United States v. Guerra, 293 F.3d 1279, 1287 (11th Cir. 2002) (affirming § 2320 conspiracy and aiding-and-abetting convictions 98 Prosecuting Intellectual Property Crimes for defendants who made labels that a co-conspirator attached to fake Cuban cigars he sold). Yet the pre-2006 definition arguably covered too narrow a swath of commercially-motivated conduct, and it generally did not explain how to deal with cases in which the defendant was caught possessing counterfeits with the intent to traffic in them. See Sections B.3.b.ii.-iii. of this Chapter. These problems were fixed by the Protecting American Goods and Services Act of 2005, enacted March 16, 2006. The statute modified the definition of the term “traffic” to (1) clarify that it includes trafficking committed for commercial purpose or financial gain (which includes the receipt or expected receipt of anything of value); (2) applies to importing or exporting counterfeit goods; and (3) includes possession with intent to transport, transfer or otherwise dispose of. See Pub. L. No. 109-181, § 2, 120 Stat. 285, 288 (2006) (amending the former 18 U.S.C. § 2320(e)(2), (3) (now numbered 2320(f )(5), (f )(2), respectively). These issues are discussed below. ii. Consideration vs. Commercial Advantage and Private Financial Gain Under the pre-2006 definition of “traffic,” the thing “of value” that a defendant had to receive as consideration for the counterfeit goods did not need to be a financial payment, but rather could be anything that had value. See United States v. Koehler, 24 F.3d 867, 870-71 (6th Cir. 1994) (affirming § 2320 conviction based on acceptance of air conditioner compressors in lieu of financial payment). That rule survived the 2006 amendments, in which “consideration” was replaced with “for purposes of commercial advantage or private financial gain,” § 2320(e)(2) (as amended), and “financial gain” was defined as including “the receipt, or expected receipt, of anything of value,” § 2320(e)(3) (as amended) (emphasis added) (now numbered 2320(f )(5), (f ) (2), respectively). The “consideration” requirement may have been too narrow to capture some types of commercially-motivated counterfeiting conduct. For example, at least one court held that the term “consideration” must be interpreted in the contractual sense as the product of a bargained-for exchange between parties. See United States v. Habegger, 370 F.3d 441, 444-45 (4th Cir. 2004). In Habegger, the Fourth Circuit held that a free sample of counterfeit goods sent to a potential customer did not constitute “trafficking” under what was then § 2320(e)(2) (now § 2320(f )(2)), even if the samples had been sent to III.Trafficking In Counterfeit Marks 99 maintain the customer’s good will, because there had been no agreement to purchase goods. Id. at 445. The court might have decided differently, however, had there been “more than a mere hope on the part of the sender that the recipient [would] purchase goods in the future,” such as if the recipient had “promised to pay for the socks, to buy additional socks if he found the samples acceptable, or even to examine the socks and consider purchasing more.” Id. To avoid problems like this, Congress replaced “consideration” with “for purposes of commercial advantage or financial gain,” a phrase which has a longstanding meaning within the copyright and criminal codes. It covers a wider variety of profit-related infringement, regardless of whether the defendant infringed for a direct quid pro quo or actually made a profit. For a detailed discussion of how to apply the commercial advantage or financial gain element, see Section B.4. of Chapter II of this Manual. The post-2006 definition of “traffic” in § 2320 is sufficiently broad to cover virtually all types of commercial transactions, but does not extend to a consumer’s acquisition of a counterfeit item solely for personal use. This was also true under the prior version of “traffic.” See Joint Statement, 130 Cong. Rec. 31,675 (1984). iii. Making and Obtaining Counterfeits vs. Possession with Intent to Traffic At first glance, possession of contraband with intent to traffic—which the old definition did not explicitly cover—appears coextensive with making or obtaining control of contraband with intent to traffic—both of which the old and new definitions explicitly included. See 18 U.S.C. § 2320(f )(5); United States v. DeFreitas, 92 F. Supp. 2d 272, 277 (S.D.N.Y. 2000) (holding that purchasing counterfeit items in China for transportation to and sale in the United States constituted an illegal act of “obtaining control” for purposes of § 2320). Yet there is a subtle—but important—distinction between “obtaining control” with intent to traffic and “possession” with intent to traffic. Consider a warehouse full of counterfeits, with no records indicating when the counterfeits were made, obtained, or transported. Under the old definition of trafficking, the defendant might argue that although the government could show that he possessed counterfeits in commercial quantities, it could not prove when he made or obtained control of them—the old definition’s operative verbs. In the same vein, the defendant might argue that without records to prove 100 Prosecuting Intellectual Property Crimes when the defendant made or obtained control of the counterfeits, a fortiori the government could not prove that these events occurred within the statute of limitations. If, however, the government need only prove that the defendant possessed the contraband with the intent to traffic in it, then the government can establish that that action occurred on the date it found the warehouse full of counterfeits; it need not prove when the defendant acquired or produced the contraband. Thus, Congress amended the definition of trafficking explicitly to include possession with intent to traffic. iv. Importing and Exporting Related to Transporting Congress added importing and exporting to the new definition of trafficking in 2006 to make clear that both acts violate § 2320. The pre-2006 definition of “traffic” covered both importing and exporting counterfeits: importing and exporting are forms of transporting goods, and the old definition explicitly covered transportation. See 18 U.S.C. § 2320(e)(2) (2000) (“[T]he term ‘traffic’ means to transport, transfer, or otherwise dispose of, to another ...”) (emphasis added) (pre-2006 amendments); DeFreitas, 92 F. Supp. 2d at 276-77 (holding that importing counterfeit items from China into the United States for sale constituted trafficking under § 2320). The 2006 amendments make it even clearer that the acts of importing and exporting counterfeits violate § 2320. c. Goods and Services (and Labels, Patches, Stickers, Wrappers, Badges, Emblems, Medallions, Charms, Boxes, Containers, Cans, Cases, Hangtags, Documentation, or Packaging of Any Type or Nature) Before the 2006 amendments, § 2320 only criminalized trafficking in counterfeit “goods” or “services” (which continue to be criminalized under § 2320(a)(1) and (a)(3)). In the 2006 amendments, Congress expanded § 2320 to criminalize trafficking in labeling and packaging components designed to be applied to accompany goods or services. Neither § 2320 nor the Lanham Act define the terms “goods or services.” Section 2320’s legislative history, however, provides some guidance regarding the meaning of “goods.” In the legislative history, Congress’s focus was on the damage caused by various types of counterfeit goods such as drugs, automobile parts, cosmetics, fertilizers, computer parts, and medical devices. H.R. Rep. No. 98-997, at 5 (1984). With regard to “services,” however, the legislative histories for § 2320 and the Lanham Act are silent. See In re Advertising & Marketing Dev., Inc., 821 F.2d 614, 618 (Fed. Cir. 1987) (discussing Lanham Act’s legislative history). Although courts have not defined “services” under III.Trafficking In Counterfeit Marks 101 § 2320, in Lanham Act cases, courts have defined the term broadly to include “the performance of labor for the benefit of another.” In re Canadian Pac. Ltd., 754 F.2d 992, 994 (Fed. Cir. 1985) (emphasis omitted); Morningside Group Ltd. v. Morningside Capital Group, L.L.C., 182 F.3d 133, 137-38 (2d Cir. 1999). The difficulty with punishing defendants for using counterfeit marks only in connection with goods and services for which the genuine mark was registered was that it created a potential loophole for trafficking in labels, documentation, and packaging with counterfeit marks. Labels, documentation, and packaging that bore counterfeit trademarks but which were unattached to other goods or services ran the possibility of not being considered “goods” under § 2320 if the mark-holder had not registered the marks for use on labels, documentation, and packaging. This was the holding of the Tenth Circuit in United States v. Giles, 213 F.3d 1247, 1253 (10th Cir. 2000) (“Section 2320 does not clearly penalize trafficking in counterfeit labels which are unattached to any goods.”). In Giles, the defendant sold patches bearing counterfeit Dooney & Burke trademarks. The patches could be attached to generic handbags and luggage to make them counterfeit, but Dooney & Burke had registered the marks for use on handbags and luggage, not on patches, and the defendant did not sell the fake handbags and luggage to which the patches were to be attached. The Tenth Circuit concluded that the patches were labels, not goods, and that the defendant could not be convicted under § 2320 for trafficking in unattached labels. The court indicated, however, that the case might have been decided differently had the marks been registered for use on patches or if the defendant had been charged with aiding-and-abetting trafficking in counterfeit goods. Id. at 1251 n.6, 1252 & n.7. Thus, a defendant who used a counterfeit mark but did not provide the good or service himself generally had to be charged under § 2320 in conjunction with conspiracy or aiding-and-abetting. Id. at 1251 n.6; United States v. Guerra, 293 F.3d 1279, 1286-87 & n.4 (11th Cir. 2002) (affirming conviction on these grounds). Congress directly addressed the Giles decision by amending § 2320 to expressly criminalize trafficking in counterfeit labels, documentation, and packaging directly: Whoever intentionally traffics or attempts to traffic in goods or services and knowingly uses a counterfeit mark on or in 102 Prosecuting Intellectual Property Crimes connection with such goods or services[, or intentionally traffics or attempts to traffic in labels, patches, stickers, wrappers, badges, emblems, medallions, charms, boxes, containers, cans, cases, hangtags, documentation, or packaging of any type or nature, knowing that a counterfeit mark has been applied thereto, the use of which is likely to cause confusion, to cause mistake, or to deceive,] shall, if an individual, be fined not more than $2,000,000 or imprisoned not more than 10 years, or both, and, if a person other than an individual, be fined not more than $5,000,000. 18 U.S.C. § 2320(a) (2006) (bracketed language inserted by the Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1(b)(1), 120 Stat. 285, 285 (2006)); see H.R. Rep. No. 109-68, at 7 (“This modification is intended to overrule the holding in the case United States v. Giles ....”). Thus, beginning in 2006, defendants could be charged with trafficking in labels, documentation, and packaging with counterfeit marks under § 2320 without resort to aiding-and-abetting or conspiracy charges. Despite the focus on labels, documentation, or packaging that bear inauthentic marks, repackaging authentic goods with inauthentic labels is criminal only in a limited set of circumstances. See Sections C.3. and D.4. of this Chapter. A defendant can be convicted for trafficking in a single good, service, label, piece of documentation or packaging. See United States v. Foote, 413 F.3d 1240, 1246-47 (10th Cir. 2005) (holding that § 2320’s use of “goods” in the plural does not preclude prosecution of a person who traffics in a single counterfeit good). Whether the things that the defendant trafficked in consist of “goods” or “services”—or as labels, documentation, or packaging intended to be used with goods or services—is governed by the victim’s certificate of registration with the United States Patent and Trademark Office. The certificate of registration will indicate whether the mark in question had been registered for goods or for services and, if so, for what class of good or service. See Section B.4.c. of this Chapter. III.Trafficking In Counterfeit Marks 103 4. The Defendant Used a “Counterfeit Mark”: Definition of a Counterfeit Mark The government must prove that the defendant knowingly used a “counterfeit mark” on or in connection with goods or services, or that a counterfeit mark was applied to the labels, documentation, or packaging. 18 U.S.C. § 2320(a). To prove this element, the government must also demonstrate that the counterfeit mark in question meets the statutory definition of a counterfeit mark in 2320(f )(1)(A). a. Not Genuine or Authentic “Counterfeit mark” is a term of art that is defined as follows: (A) a spurious mark— (i) that is used in connection with trafficking in any goods, services, labels, patches, stickers, wrappers, badges, emblems, medallions, charms, boxes, containers, cans, cases, hangtags, documentation, or packaging of any type or nature; (ii) that is identical with, or substantially indistinguishable from, a mark registered on the principal register in the United States Patent and Trademark Office and in use, whether or not the defendant knew such mark was so registered; (iii) that is applied to or used in connection with the goods or services for which the mark is registered with the United States Patent and Trademark Office, or is applied to or consists of a label, patch, sticker, wrapper, badge, emblem, medallion, charm, box, container, can, case, hangtag, documentation, or packaging of any type or nature that is designed, marketed, or otherwise intended to be used on or in connection with the goods or services for which the mark is registered in the United States Patent and Trademark office; and (iv) the use of which is likely to cause confusion, to cause mistake, or to deceive. 18 U.S.C. § 2320(f )(1)(A). 104 Prosecuting Intellectual Property Crimes A “spurious” mark is one that is “not genuine or authentic.” Joint Statement, 130 Cong. Rec. 31,675 (1984). Although this definition appears to indicate that the mark itself must be counterfeit, rather than the goods or services (or, in a labels case, the labels, documentation, or packaging), it is well-settled that a genuine or authentic mark becomes counterfeit when it is used in connection with something else that is counterfeit. See 4 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition § 25:15 (4th ed. 2012); United States v. Petrosian, 126 F.3d 1232 (9th Cir. 1997). In Petrosian, the defendant, who filled genuine Coca-Cola bottles with a substitute carbonated beverage and sold it as CocaCola, contended that his Coca-Cola marks were not counterfeit because his genuine bottles bore genuine marks. 126 F.3d at 1233. The Ninth Circuit disagreed, holding that “[w]hen a genuine trademark is affixed to a counterfeit product, it becomes a spurious mark.... The Coca-Cola mark became spurious when [defendant] affixed it to the counterfeit cola because the mark falsely indicated that Coca-Cola was the source of the beverage in the bottles and falsely identified the beverage in the bottles as Coca-Cola.” Id. at 1234. See also Section C.3. of this Chapter concerning the repackaging of authentic goods. This rule should apply equally to services, labels, documentation, and packaging. The definition of “counterfeit mark” in § 2320(f )(1)(B) also includes designations protected by the Olympic Charter Act. See Section D.8. of this Chapter. of: Separate laws punish the counterfeit use of emblems, insignias, and names • • • • • • • • • • • military medals and designations; veterans’ organizations; cremation urns for military use; the seals of the United States President, Vice President, Senate, House of Representatives, and Congress; federal agencies; the Department of Interior’s golden eagle insignia; police badges; the Red Cross; the 4-H club; the Swiss Confederation; Smokey the Bear; and III.Trafficking In Counterfeit Marks 105 • Woodsy the Owl. See 18 U.S.C. §§ 700-716. b. The Counterfeit Mark Must Be Identical to or Indistinguishable from a Genuine Mark Owned by Another Under 18 U.S.C. § 2320(f )(1)(A), a counterfeit mark is a spurious mark that is “identical with, or substantially indistinguishable from,” a federally registered mark. This standard is based on the same standard set forth in the Lanham Act, 15 U.S.C. § 1127. The legislative history suggests that the civil and criminal standards should be interpreted the same. See Joint Statement, 130 Cong. Rec. 31,675-76 (1984) (noting that the civil and criminal standards “differ slightly in their terms, but [] are identical in substance,” and citing civil cases to explain both standards). To the extent the criminal and civil standards diverge at all, the criminal standard should be interpreted more narrowly only in cases at the outer margins. United States v. Guerra, 293 F.3d 1279, 1288 (11th Cir. 2002) (citing Joint Statement, 130 Cong. Rec. 31,675 (stating that § 2320 is not intended to criminalize what would have been “arguable” cases of civil trademark infringement before the criminal act’s passage)). Note, however, that although the criminal and civil standards are virtually identical with respect to what constitutes a “counterfeit,” civil law also prohibits the unauthorized use of a “colorable imitation of a registered mark,” see 15 U.S.C. § 1114(1) (a), which by its terms falls short of being a counterfeit mark that is “identical with, or substantially indistinguishable from” a genuine mark. Nevertheless, “[b]ecause of the similarity between this definition and the § 2320 definition of ‘counterfeit mark,’ we find Lanham Act civil counterfeiting cases helpful to our analysis of criminal counterfeiting cases brought under § 2320(a).” United States v. Lam, 677 F.3d 190, 199 n.8 (4th Cir. 2012) Whether a defendant has used a mark that is “substantially indistinguishable” from a federally registered mark is a fact question that must be determined on a case-by-case basis. See Joint Statement, 130 Cong. Rec. 31,675 (“the definition of ‘substantially indistinguishable’ will need to be elaborated on a case-bycase basis”); cf. Colgate-Palmolive v. J.M.D. All-Star Import and Export Inc., 486 F. Supp. 2d 286, 291 (S.D.N.Y. 2007) (“Cases applying the ‘substantially indistinguishable’ test are inherently fact intensive.”). Nevertheless, Congress did give the following guidance on the scope of the substantially indistinguishable standard: 106 Prosecuting Intellectual Property Crimes Obviously, a mark need not be absolutely identical to a genuine mark in order to be considered “counterfeit.” Such an interpretation would allow counterfeiters to escape liability by modifying the registered trademarks of their honest competitors in trivial ways. However, the sponsors do not intend to treat as counterfeiting what would formerly have been arguable, but not clear-cut, cases of trademark infringement. Joint Statement, 130 Cong. Rec. 31,676 (1984); accord Lam, 677 F.3d at 199 (quoting United States v. Guerra, 293 F.3d 1279, 1288 (11th Cir. 2002) (quoting Joint Statement, 130 Cong. Rec. 31,675)); Pepe (U.K.) Ltd. v. Ocean View Factory Outlet, 770 F. Supp. 754, 758 (D.P.R. 1991) (same); ColgatePalmolive, 486 F. Supp. 2d at 289 (same). For example, in Pepe, the court held that a defendant uses a mark that is substantially indistinguishable from a registered mark when the similarities between the marks presents “more than an arguable case of infringement.” 770 F. Supp. at 759 (emphasis in original). In Montres Rolex, S.A. v. Snyder, a case that pre-dates the enactment of § 2320 but was cited with approval in the statute’s legislative history (130 Cong. Rec. at 31,675-76), the Second Circuit acknowledged that the difference between the “likely to cause confusion” and “substantially indistinguishable” standards “may be more theoretical than real” in some cases. 718 F.2d 524, 531 (2d Cir. 1983). More recently, in reviewing a jury’s finding that two marks are substantially indistinguishable from one another, the Fourth Circuit held that “a good displaying an allegedly counterfeit trademark must possess pronounced differences from a legitimate trademarked good for us to declare that no rational jury could find that it was a counterfeit.” Lam, 677 F.3d at 199 (emphasis added). “In general, however, [word] marks that are similar to the registered mark, but differ by two or more letters, are not likely to be considered counterfeit,” Colgate-Palmolive, 486 F. Supp. 2d at 291, suggesting that marks that differ in only one letter may be considered counterfeit. For example, use of the mark “Prastimol” for a medication that is the functional equivalent of the product sold under the trademark “Mostimol” would not be a crime. Joint Statement, 130 Cong. Rec. 31,676. Nor would a ‘P’ superimposed over a ‘V’ on a fleurde-lis pattern be substantially indistinguishable from an ‘L’ superimposed over a ‘V’ over the same pattern, or using “Amazonas” rather than “Amazon,” or “Bolivia” rather than “Bulova.” See Montres Rolex, 718 F.2d at 531-32 (noting that these examples might create a likelihood of confusion without being III.Trafficking In Counterfeit Marks 107 substantially indistinguishable, in case interpreting Customs’s power to seize counterfeits). A counterfeiter who sells a look-alike with an altered brand name can still be convicted, however, if his look-alike reproduces other registered trademarks. See United States v. Yi, 460 F.3d 623, 627 n.1, 629 n.4 (5th Cir. 2006) (holding that even though defendant’s batteries were named “Dinacell” rather than “Duracell,” the batteries were still counterfeit because they used Duracell’s copper-top and black-body trademark). Likewise, a counterfeiter who sells a look-alike with an altered trademarked design can still be convicted if the lookalike reproduced another registered design mark. Lam, 677 F.3d at 198-99 (rejecting defendant’s argument that “[n]o rational jury would conclude that a mark with a knight integrated onto it was a counterfeit of a mark without a knight” and holding that a rational jury could find that defendant’s mark bearing a plaid and an equestrian knight was substantially indistinguishable from Burberry’s federally registered plaid or “Check” mark without a knight, “especially in light of the evidence demonstrating that Burberry often sells goods displaying the Burberry Check mark and the Burberry Equestrian mark together”) (internal quotation marks omitted). Prosecutors should pay special attention to word marks. A trademark can consist of a symbol, a picture, or a stylized depiction of a word (such as the distinctive Coca-Cola® cursive mark). A trademark can also consist of a simple word. A word mark registered in a neutral font and all capital letters “covers all design features and is not limited to any special form or lettering.” Sally Beauty Co. v. Beautyco, Inc., 304 F.3d 964, 970 (10th Cir. 2002) (emphasis added) (citations omitted); 3 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition § 19:58 (4th ed. 2012) (“‘Registrations with typed drawings are not limited to any particular rendition of the mark and, in particular, are not limited to the mark as it is used in commerce.’”) (quoting Cunningham v. Laser Golf Corp., 222 F.3d 943, 950 (Fed. Cir. 2000)); see also Cunningham, 222 F.3d at 949-50; 37 C.F.R. § 2.52 (2012). In other words, there is a strong argument that a mark registered in this manner is counterfeited by any infringing use of the mark, whether in the font used by the mark-holder or not, because the infringing word mark is substantially indistinguishable from the word mark itself. When trying to determine which trademarks the defendant infringed, prosecutors and agents should consult with the victim. Although the government itself can search for trademarks on the United States Patent and 108 Prosecuting Intellectual Property Crimes Trademark Office’s website, these searches can be cumbersome. Given the range of perceptible elements that can be registered as marks—witness the color pink for Owens Corning fiberglass, the NBC chime, the Burberry plaid, and the shape of the Coca-Cola bottle (respectively U.S. Trademark Reg. Nos. 1439132 and 2380742, 0916522, 2022789, and 1057884)—the victim is best suited to identify which elements were registered as marks and which may have been counterfeited. Section 2320 does not specify the procedure for establishing at trial that the counterfeit mark is identical to or substantially indistinguishable from a genuine registered mark. See Guerra, 293 F.3d at 1288. In Guerra, the Eleventh Circuit rejected the defendant’s contention at trial that the government must 1) introduce genuine trademarks affixed to genuine goods, 2) introduce the testimony of a representative from the mark-holder, and 3) rely on investigative agents who are experts in the counterfeited product or service. Id.; see also United States v. Able Time, Inc., 545 F.3d 824, 836 (9th Cir. 2008) (rejecting the proposition that a factfinder must compare the alleged counterfeit mark with the registered mark as it appears on actual merchandise and holding that “[o]n remand, the factfinder may compare the offending mark to the mark on the registration certificate”). Instead, the Eleventh Circuit ruled that introducing registered trademark designs and labels produced by authorized licensees was sufficient. Guerra, 293 F.3d at 1288. Other courts have approved the government’s use of expert testimony and a comparison between counterfeit and genuine goods. See United States v. Yamin, 868 F.2d 130, 135 (5th Cir. 1989); United States v. McEvoy, 820 F.2d 1170, 1172 (11th Cir. 1987) (same). Prosecutors should note that courts have declined to adopt the point of view of experts in determining whether defendants used marks that are substantially indistinguishable from federally registered marks. Montres Rolex, 718 F.2d at 531 (holding that the same “average purchaser test” for the “likely to cause confusion” infringement standard applies to the “substantially indistinguishable” standard); Pepe, 770 F. Supp. at 758 (“The court in the Rolex case made the determination whether a mark was a substantially indistinguishable counterfeit, as opposed to a mere infringement, from the standpoint of an average purchaser rather than from the standpoint of an expert.”). In civil cases, courts have also allowed evidence of actual confusion, such as customers who were fooled, and trademark surveys. 4 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition §§ 23:2, 13, 17, 63 (4th ed. 2012). Market surveys are often used in civil cases, but can raise evidentiary III.Trafficking In Counterfeit Marks 109 issues. See, e.g., 6 McCarthy on Trademarks and Unfair Competition §§ 32:158, 170; Citizens Fin. Group v. Citizens Nat’l Bank of Evans City, 383 F.3d 110 (3d Cir. 2004). As of the writing of this Manual, no reported cases address the admissibility of market surveys in criminal trademark prosecutions. The procedures and analysis for comparing counterfeit and legitimate marks are also addressed in Section B.4.g. of this Chapter, which discusses how to prove likelihood of confusion. See Montres Rolex, 718 F.2d at 531. Proving that two marks are likely to be confused is not always sufficient to prove that they are identical or substantially indistinguishable. Likelihood of confusion is a lower hurdle. See id. at 531-32 (noting examples of marks that were likely to cause confusion, but which were not substantially indistinguishable from the real thing: a ‘P’ superimposed over a ‘V’ on a fleur-de-lis pattern vs. an ‘L’ superimposed over a ‘V’ over the same pattern; “Amazonas” vs. “Amazon”; and “Bolivia” vs. “Bulova”). For actual comparisons of marks that were alleged to be confusingly similar, see 3 McCarthy on Trademarks and Unfair Competition §§ 23:21-40, keeping in mind the potential differences between civil and criminal cases (see Section B.2. of this Chapter) and the difference between “likelihood of confusion” and marks being “substantially indistinguishable.” c. The Genuine Mark Must Be Federally Registered on the U.S. Patent and Trademark Office’s Principal Register The victim’s mark must have been registered on the principal register in the United States Patent and Trademark Office (“USPTO”), 18 U.S.C. § 2320(f ) (1)(A)(ii), unless the case involves the Olympic symbols (see Section D.8. of this Chapter). Federal registration is a jurisdictional element. Thus, § 2320 cannot be charged if the victim’s mark was only registered on the USPTO’s supplemental register, recorded with Customs, registered with state agencies, or protected at common law. However, if a § 2320 charge is unavailable because the mark was not registered on USPTO’s principal register, alternate charges such as mail fraud, wire fraud, or state or local trademark charges may still be available. See Section F. of this Chapter. Proving the mark’s registration is usually straightforward. Generally, the government will simply offer a certified copy of the certificate of registration. The court may take judicial notice of registration certificates. See Fed. R. Evid. 110 Prosecuting Intellectual Property Crimes 201(b); Duluth News-Tribune v. Mesabi Publ’g Co., 84 F.3d 1093, 1096 n.2 (8th Cir. 1996); Omega S.A. v. Omega Eng’g, 228 F. Supp. 2d 112, 120 & n.26 (D. Conn. 2002); cf. Island Software and Computer Serv. v. Microsoft Corp., 413 F.3d 257, 261 (2d Cir. 2005) (approving judicial notice of copyright registration certificates). Unofficial registration information can be searched on the USPTO’s website: http://www.uspto.gov/main/trademarks.htm. Formal, certified copies of the registration certificates can be obtained directly from USPTO. The Department of Justice has no special method for expediting delivery of certificates from USPTO, beyond perhaps a grand jury or trial subpoena, which should be discouraged. The usual method is to obtain certified copies of certificates from the victims themselves. Registration may also be proved through other means, such as testimony of the mark-holder and other circumstantial evidence. For example, in United States v. DeFreitas, 92 F. Supp. 2d 272, 278 (S.D.N.Y. 2000), the court allowed the jury to conclude that a mark was registered based on testimony of the markholder for Beanie Babies along with samples of genuine Beanie Babies with tags bearing registered tags, the mark-holder’s catalogue containing a statement that the trademark was registered, and testimony of the mark-holder’s CEO. In United States v. Park, 164 Fed. Appx. 584, 585-86 (9th Cir. 2006), the Ninth Circuit found that the government had proved registration by introducing a civil complaint against the defendant in a prior suit that she had settled, in which the complaint stated that the trademarks were registered; by introducing testimony of the defendant’s civil attorney in that case, who testified that the victims were trademark owners at the time of the prior civil action; and by introducing testimony of an agent who testified that the items seized at the defendant’s business were identical to items registered as trademarks in the USPTO. Prosecutors who intend to prove registration by alternate means, however, must take care to ensure that the evidence presented is sufficiently detailed and precise. For example, in United States v. Xu, 599 F.3d 452, 455 (5th Cir. 2010), the Fifth Circuit vacated the defendant’s conviction for trafficking in a counterfeit version of a pharmaceutical drug called Zyprexa because it concluded the government failed to prove the registration of the drug’s trademark. During trial, an employee of the drug’s manufacturer was shown a counterfeit container of the medication and was asked about the symbol that appeared next to the drug’s name; the employee responded that it was the “registered trademark symbol.” Id. at 454. The court concluded this III.Trafficking In Counterfeit Marks 111 testimony was insufficient to prove registration because, as an initial matter, “the symbol being discussed was on a package of allegedly counterfeit goods, not authentic drugs, and no effort was made to demonstrate that authentic Zyprexa carried the same symbol.” Id. Furthermore, the court explained that the mere statement that the trademark was “registered” was insufficient due to the fact that it did not specify that the registration appeared on the USPTO’s principal register, as opposed to on its supplemental register, with Customs, or perhaps with a state agency. Id. at 455; see also United States v. Xu, No. H-07362, 2008 WL 5122125, at *3-4 (S.D.Tex. Dec. 4, 2008) (explaining district court’s reasoning for granting judgment of acquittal with regard to additional counts of trafficking in other counterfeit drugs due to government’s failure to prove mark registration), vacated, 599 F.3d 452 (5th Cir. 2010). Registration is prima facie evidence that the registrant owns the mark and that the registration is valid. 15 U.S.C. § 1057(b). In criminal prosecutions, the genuine mark is usually treated as “incontestable” if it has been registered on the principal register for more than five consecutive years. See 15 U.S.C. § 1065 (setting out conditions for “incontestability”). A federal trademark registration may, however, be canceled in whole or part in a civil judicial or administrative proceeding. See 15 U.S.C. § 1064. The government need not prove that the defendant was aware that the mark was registered. 18 U.S.C. § 2320(f )(1)(A)(ii) (stating that a counterfeit mark is one that is “identical with, or substantially indistinguishable from” a registered mark “whether or not the defendant knew such mark was so registered”). See also United States v. Guerra, 293 F.3d 1279, 1287 (11th Cir. 2002) (holding that “it is irrelevant that [the defendant] did not know the marks were registered in the United States”); United States v. Sung, 51 F.3d 92, 93-94 (7th Cir. 1995) (holding that § 2320’s definition of “counterfeit mark” imposes on defendants “the duty to inquire into the [registration] status of the mark”) (citations omitted). d. The Genuine Mark Must Have Been in Use by the Mark-Holder or Its Licensee The genuine mark must also be “in use,” presumably by the mark holder or his licensee, 18 U.S.C. § 2320(f )(1)(A)(ii). See Section A.1. of this Chapter, except in cases involving protected Olympic symbols, as discussed in Section D.8. of this Chapter. 112 Prosecuting Intellectual Property Crimes The term “in use” is not defined or explained in the statute, its legislative history, or in case law. The Lanham Act, however, defines a trademark’s “use in commerce” as “the bona fide use of a mark in the ordinary course of trade, and not made merely to reserve a right in a mark.” 15 U.S.C. § 1127. See also ConAgra, Inc. v. George A. Hormel, & Co., 990 F.2d 368, 371-72 (8th Cir. 1993) (affirming district court’s finding that the trademark application was based on actual sales and not a “sham use”). Civil cases have held that “in use” means use in the United States, not in other nations. See Marshak v. Treadwell, 240 F.3d 184 (3d Cir. 2001); Rivard v. Linville, 133 F.3d 1446, 1448-49 (Fed. Cir. 1998); see also United States v. Penton, 303 Fed. Appx. 774, 780-81 (11th Cir. 2008) (stating that defendant was correct when he argued that because products bearing particular marks were not sold in the United States they could not be “in use” for the purposes of § 2320). To prove that the genuine mark was in use during the offense, the government may not rely solely on a certification of registration that shows that the victim registered the trademark before the date of the offense. Registration merely requires a mark-holder to have a bona fide intent to use the mark, which does not translate into actual use. United States v. Foote, 238 F. Supp. 2d 1271, 1278 (D. Kan. 2002), aff’d, 413 F.3d 1240, 1248 (10th Cir. 2005); United States v. Guerra, 293 F.3d 1279, 1290 (11th Cir. 2002). Nor may the government establish use by relying on the jurors’ probable experience with the trademark at issue, since the jurors’ experience is not legal evidence. Foote, 238 F. Supp. 2d at 1279 n.11. Evidence that will suffice to demonstrate a mark is “in use,” however, includes proof of registration in conjunction with evidence of the first use by the mark-holder and testimony by a representative of the mark-holder that the mark appears on every good produced; Foote, 413 F.3d at 1248, aff’g 238 F. Supp. 2d at 1279; a magazine showing the genuine trademarked goods for sale at the time of offense, Guerra, 293 F.3d at 1291; or a civil complaint from a civil action alleging that the victim used the mark before the criminal offense in conjunction with testimony that the trademark owners had protected their marks during the criminal offense, United States v. Park, 164 Fed. Appx. 584, 585-86 (9th Cir. 2006). Although § 2320(f )(1)(A)(ii) does not specify when the registered mark must have been “in use,” courts have held that it must have been in use during the defendant’s alleged offense. See Park, 164 Fed. Appx. at 585 (stating that “registration and use at the time of [a trademark] conspiracy can III.Trafficking In Counterfeit Marks 113 be indirectly established if the government provides evidence that trademarks for the relevant items were registered and used prior to and after the conspiracy was formed, as long as the evidence of preceding and subsequent registration and use is reasonably close to the time of the actual conspiracy”); Foote, 238 F. Supp. 2d at 1278 n.8 (holding that without a temporal limit “the statute would allow a prosecution for trafficking in products with trademarks that the trademark owner did not begin to use until trial”); Guerra, 293 F.3d at 1291. The government should prove that the victim used his genuine mark as early as when the defendant first used his counterfeit mark, if not earlier, and that the victim continued using the genuine mark throughout the offense. Foote, 238 F. Supp. 2d at 1274 n.4, 1277-79. Proving that the mark was in use at the time of trial may not suffice to prove that it was in use during the offense. Id. at 1278. e. Use of the Counterfeit Mark “On or In Connection With” Goods or Services For cases involving goods or services under 18 U.S.C. § 2320(a)(1), the government must prove that the defendant used the counterfeit mark “on or in connection with” goods or services. Similarly, in proving that a good or service is a “counterfeit military good or service” for offenses involving military counterfeits charged under § 2320(a)(3), the government must prove that the good or service “uses a counterfeit mark on or in connection with such good or service.” 18 U.S.C. § 2320(f )(4). In a case involving labels or packaging under 18 U.S.C. § 2320(a)(2), as of the 2006 amendments, the government must show that the counterfeit mark “is applied to” a label, documentation, packaging, or the like that is “designed, marketed, or otherwise intended to be used on or in connection with the goods or services for which the mark is registered.” § 2320(f )(1)(A)(iii) (emphasis added). The 2006 amendments addressing labels also recognized that a counterfeit mark might not just be applied to or used in connection with labels, documentation, and packaging, but might even “consist[] of ” a label, documentation, or packaging component, as was discussed in United States v. Giles, 213 F.3d 1247, 1252 n.7 (10th Cir. 2000). See Section B.3.c. of this Chapter. The term “in connection with” has a broader meaning than “on.” For example, a defendant who uses a counterfeit mark to advertise a name-brand good or service and then provides an unmarked, off-brand or no-brand good or service can be said to have used a counterfeit mark “in connection with” the 114 Prosecuting Intellectual Property Crimes good or service, even if he did not use it “on” the good or service. This conduct should therefore be covered by § 2320. Even before the 2006 amendments addressing counterfeit labeling, a person who trafficked in labels, documentation, or packaging—unattached to the underlying goods—may have been prosecuted under a theory of conspiracy or aiding-and-abetting a substantive counterfeit goods offense. See Section B.3.c. of this Chapter. The 2006 amendments, however, allow such a defendant to be charged under § 2320 directly and without resort to theories of secondary liability and in cases where the defendant acted alone. Now, the government need only show that the labels, documentation, or packaging were “designed, marketed, or otherwise intended to be used on or in connection with the goods or services.” § 2320(f )(1)(A)(iii). Because the statute does not define what constitutes “use” of a counterfeit mark by a defendant, defendants may argue that this term should be given a restrictive meaning that does not reach their activities. The Third Circuit rejected this kind of challenge in United States v. Diallo, 575 F.3d 252 (3d Cir. 2009). In Diallo, law enforcement conducted a traffic stop and found counterfeit Louis Vuitton handbags sealed in plastic bags in the defendant’s vehicle. Id. at 253-54. Citing Bailey v. United States, 514 U.S. 137 (1995), a Supreme Court opinion interpreting the meaning of “uses” in the context of a firearms statute, the defendant asserted that “use” of the counterfeit mark “require[s] active employment of the mark by showing or displaying the goods” bearing that mark. Diallo, 575 F.3d at 254. The Third Circuit disagreed, noting that Congress intended to “reach[] a stream of illegal commerce [in counterfeit items] and not simply its point of sale.” Id. at 260. The court concluded that “use” should be given its “ordinary and natural meaning”; the defendant therefore could be said to have “used” the Louis Vuitton mark because possession of the handbags bearing the counterfeit mark “enabled him to represent to others falsely - that he owned genuine Louis Vuitton handbags” and to enjoy having such bags in his store’s inventory, even if they had not yet been offered for sale. Id. at 260-61. f. The Counterfeit Mark Must Have Been Used for the Same Class of Goods or Services for Which the Genuine Mark Was Registered Section 2320’s definition of a “counterfeit mark” requires the government to show that the defendant’s mark is “used in connection with trafficking in any goods [or] services,” “identical with, or substantially indistinguishable III.Trafficking In Counterfeit Marks 115 from, a mark registered on the principal register in the [USPTO],” and “used in connection with the goods or services for which the mark is registered with the [USPTO].” 18 U.S.C. § 2320(f )(1)(A)(i)-(iii) (but see Section D.8. of this Chapter concerning cases involving Olympic symbols). Congress intended this requirement to be an important and explicit distinction between criminal and civil trademark infringement cases. “[A] plaintiff with a Federal registration for ... [a mark] on typewriters might have a [civil] Lanham Act remedy against a defendant who used that mark to identify typing paper, even though the plaintiff had not registered that mark for use in connection with typing paper. Under [§ 2320], however, the use of the mark ... on typing paper would not count as the use of a ‘counterfeit mark.’” Joint Statement, 130 Cong. Rec. 31,676 (1984). Prosecutors therefore should be careful to ensure that the class of goods and services in which the defendant trafficked match the class of goods and services for which the victim’s mark was registered. But what about when the defendant uses the mark on labels, documentation, or packaging that are for—but unattached to—the class of goods or services indicated on the registration certificate, and not directly on the underlying goods or services themselves? The 2006 amendments addressed this issue by amending § 2320 to allow the prosecution of traffickers in counterfeit labels, documentation, and packaging directly under § 2320. See Section B.3.c. of this Chapter for a discussion of the 2006 amendments and United States v. Giles, 213 F.3d 1247, 1253 (10th Cir. 2000). In doing so, Congress did not relax the requirement of matching the defendant’s goods and services to the class of goods and services on the registration certificate. Instead, Congress adapted the requirement for labels, documentation, and packaging cases so that the government must prove that those items were “designed, marketed, or otherwise intended to be used on or in connection with the goods or services for which the mark is registered in the United States Patent and Trademark Office.” § 2320(f )(1)(A)(iii). The class of goods or services for which a particular mark was registered can be found on the mark’s registration certificate. For information on obtaining these certificates, see Section B.4.c. of this Chapter. g. Likelihood of Confusion, Mistake, or Deception The government must prove that the counterfeit mark is “likely to cause confusion, to cause mistake, or to deceive.” 18 U.S.C. § 2320(f )(1)(A)(iv). (For the standards in cases involving protected Olympic symbols, see Section 116 Prosecuting Intellectual Property Crimes D.8. of this Chapter.) Because this requirement is included in the definition of a “counterfeit mark,” it is not necessary for prosecutors to separately charge that the counterfeit mark is “likely to cause confusion, to cause mistake, or to deceive” in the indictment, particularly with respect to charges under 18 U.S.C. § 2320(a)(1) and (3). Prosecutors may, however, want to consider including the language when charging trafficking in labeling components in violation of 18 U.S.C. § 2320(a)(2), because that subsection expressly incorporates the language “likely to cause confusion, to cause mistake, or to deceive” in the statutory provision. Although courts and commentators routinely focus only on the counterfeit mark’s propensity to confuse, the statute also allows for proof of mistake or deception, and all three should be charged in the indictment. The government does not have to prove that the defendant’s conduct resulted in actual confusion because “[t]he statute expressly requires only likelihood of confusion.” United States v. Yamin, 868 F.2d 130, 133 (5th Cir. 1989) (emphasis added). Defendants often argue that their conduct raised no likelihood of confusion because the purchaser knew that the goods were counterfeit, for example because the fake goods were offered at an unusually low price, or because the defendant specifically told the purchaser that the goods were counterfeit. Courts have uniformly rejected these arguments under the theory of “secondary” or “post-sale” confusion (i.e., the confusion of the direct purchaser’s downstream customers or even of non-purchasers who could be confused by seeing the counterfeit merchandise on the street). See, e.g., United States v. Foote, 413 F.3d 1240, 1245-6 (10th Cir. 2005); United States v. Hon, 904 F.2d 803, 808 (2d Cir. 1990); Yamin, 868 F.2d at 133; United States v. Torkington, 812 F.2d 1347, 1352 (11th Cir. 1987); United States v. Gantos, 817 F.2d 41, 43 (8th Cir. 1987); United States v. Gonzales, 630 F. Supp. 894, 896 (S.D. Fla. 1986) (denying motion to dismiss § 2320 indictment because defendants’ low price did not preclude finding that they could cause confusion, mistake or deception). For example, in Foote, the defendant argued that because he “openly advertised that he sold counterfeit merchandise” and “informed each customer that his merchandise was fake,” his actions did not meet the confusion requirement in § 2320. Foote, 413 F.3d at 1245. The Tenth Circuit rejected this argument because the confusion requirement is “not restricted to instances in which direct purchasers are confused or deceived by the counterfeit goods.” Id. (internal quotation marks omitted) (citing Yamin, 868 F.2d at 132). Rather, the plain language of the statute indicates that it is “the defendant’s use of the product III.Trafficking In Counterfeit Marks 117 in commerce (i.e., the sale of the counterfeit product) that is likely to cause confusion, mistake, or deception in the public in general.” Foote, 413 F.3d at 1246; see also Torkington, 812 F.2d at 1353 (“A trademark holder’s ability to use its mark to symbolize its reputation is harmed when potential purchasers of its goods see unauthentic goods and identify these goods with the trademark holder.”) (emphasis added) (citations omitted); S. Rep. No. 98-526 (1984), reprinted in 1984 U.S.C.C.A.N. 3627. The post-sale confusion doctrine was originally developed by courts in interpreting the identical confusion provision in the Lanham Act. See 4 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition § 23:7 (4th ed. 2012). Courts adopted the doctrine in criminal cases because to hold otherwise would undermine the goals of trademark protection. Section 2320 was “not just designed for the protection of consumers,” but also for “the protection of trademarks themselves and for the prevention of the cheapening and dilution of the genuine product.” Hon, 904 F.2d at 806; see also Torkington, 812 F.2d at 1352-53; Stop Counterfeiting in Manufactured Goods Act, H. R. Rep. 10968, at 8 n.2 (2005), reprinted in 2006 U.S.C.C.A.N. 211, 216 (“Congress was concerned not only that trademark counterfeiting defrauds purchasers, ... but also that counterfeiters can earn enormous profits by capitalizing on the ... efforts of honest manufacturers at little expense to themselves.”) (citations, alterations in original, and internal quotation marks omitted). The Second Circuit interpreted “section 2320’s confusion requirement to include the nonpurchasing public advances the important purpose underlying the trademark laws of protecting the trademark owner’s investment in the quality of the mark and his product’s reputation, one that is independent of the goal of preventing consumer deception.” Hon, 904 F.2d at 806; see also United States v. Farmer, 370 F.3d 435, 441 (4th Cir. 2004) (Congress intended to give trademark owners “the ‘right to control the quality of the goods manufactured and sold’ under that trademark”) (citations omitted). This is the same reason why the government need not demonstrate that the counterfeit product is of lesser quality than the genuine product. E.g., Farmer, 370 F.3d at 441. Even if the consumer is not defrauded, the counterfeiter is still trading off another’s name without authorization. See Section D.1. of this Chapter. Because the government need only prove the likelihood of confusion, it need not prove that the defendant intended to defraud or mislead purchasers. See United States v. Brooks, 111 F.3d 365, 372 (4th Cir. 1997) (rejecting defense that defendants did not use counterfeit marks “for the purpose of deception 118 Prosecuting Intellectual Property Crimes or to cause confusion or mistake”); Yamin, 868 F.2d at 132 (holding that the statute’s application is not restricted to instances in which direct purchasers are confused or deceived by the counterfeit goods); Gantos, 817 F.2d at 4243 (affirming conviction even though defendant disclosed to his immediate customers that Rolex watches were copies); Torkington, 812 F.2d at 1353 n.7 (noting that Congress eliminated from § 2320 a mens rea element consisting of an intent to deceive or defraud). Likelihood of confusion can be proved with a variety of evidence, such as the testimony of customers who mistakenly bought fakes, experts on market confusion, or victim representatives who can discuss the fake and real goods’ similarities. See, e.g., 4 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition §§ 23:2, 13, 17, 63 (4th ed. 2012); see also United States v. Penton, 303 Fed. Appx. 774, 781-82 (11th Cir. 2008). Although evidence of actual confusion is not necessary, it can often be very persuasive. See United States v. McEvoy, 820 F.2d 1170, 1172 (11th Cir. 1987) (affirming conviction based on, inter alia, expert testimony that customers often confuse fake and genuine watches and on a defense witness’s inability to distinguish between fake and genuine watches). It is worth noting that in civil counterfeiting cases, where two marks are identical or substantially indistinguishable and are used on the same good, confusion is presumed. E.g., Polo Fashions, Inc. v. Craftex, Inc., 816 F.2d 145, 148 (4th Cir. 1987) (“Where, as here, one produces counterfeit goods in an apparent attempt to capitalize upon the popularity of, and demand for, another’s product, there is a presumption of a likelihood of confusion.”). In such civil counterfeiting cases, federal courts do not consider the “Polaroid” factors set forth in Polaroid Corp. v. Polarad Elecs. Corp., 287 F.2d 492, 495 (2d Cir. 1961), commonly associated with civil trademark infringement cases. Id. (test used in civil cases to determine likelihood of confusion unless goods are identical and directly competitive); Colgate-Palmolive v. J.M.D. All-Star Import and Export Inc., 486 F. Supp. 2d 286, 289 (S.D.N.Y. 2007) (“When counterfeit marks are involved, it is not necessary to consider the factors set out in Polaroid [], which are used to determine whether a mark is a colorable imitation of a registered mark that creates a likelihood of confusion about it source, because counterfeit marks are inherently confusing.”) (internal quotation marks and citations omitted). Unlike civil counterfeit trademark law, and as already noted, § 2320(f )’s definition of “counterfeit mark” expressly requires the government to prove III.Trafficking In Counterfeit Marks 119 likelihood of confusion in a criminal counterfeiting case. Congress included this requirement “to ensure that no conduct will be criminalized by this act that does not constitute trademark infringement under the Lanham Act.” Joint Statement, 130 Cong. Rec. 31,675 (1984). Nevertheless, prosecutors should resist defendants’ attempts to require the government to prove the civil Polaroid factors to determine likelihood of confusion because of the heightened requirements already imposed by the other elements of § 2320. Where those heightened elements are met, likelihood of confusion is all but certain. For instance, the government can only bring a case under § 2320 where the class of goods are identical. See § 2320(f )(1)(A)(i)-(iii). Section 2320’s definition of a “counterfeit mark” requires the government to show that the defendant’s mark is “used in connection with trafficking in any goods [or] services,” “identical with, or substantially indistinguishable from, a mark registered on the principal register in the [USPTO],” and “used in connection with the goods or services for which the mark is registered with the [USPTO].” Id. In other words, the government already must meet a requirement not present in civil counterfeiting cases – that a defendant used their counterfeit mark on the same class of goods on which the trademark owners use their genuine, federally registered marks. “Where the products are identical and the jury has concluded that the defendant has met the two-pronged mens rea standard of section 2320, a requirement that confusion among actual or potential purchasers be shown is unnecessary.” United States v. Hon, 904 F.2d 803, 808 (2d Cir. 1990); United States v. Torkington, 812 F.3d 1347, 1351 n.4 (11th Cir. 1987) (the likelihood of confusion “element should be easily satisfied if the other elements of a ‘counterfeit mark’ have been proven – since a counterfeit mark is the most egregious example of a mark that is likely to cause confusion”) (quoting Joint Statement, 130 Cong. Rec. 31,675 (1984)) (emphasis in original). For the same reasons, prosecutors should also oppose attempts to compel courts to incorporate the “Polaroid factors” in jury instructions regarding § 2320’s likelihood of confusion requirement. Hon, 904 F.2d at 808, 809 (rejecting defendant’s appeal for failure to instruct on Polaroid factors because “the non-exclusive Polaroid factors themselves ... are designed to assess infringement ‘[w]here the products are different’” and that “[a] defendant is not entitled to a jury charge simply to create a reasonable doubt when on the facts and the law as correctly applied there should be none”) (quoting Polaroid, 287 F.2d at 495); United States v. McEvoy, 820 F.2d 1170, 1172, 1172 n.1 (11th Cir. 1987) (rejecting appeal for failure to “give an instruction which listed factors to be considered in determining” likelihood of confusion and expressing “no 120 Prosecuting Intellectual Property Crimes opinion as to whether the district court would have abused its discretion if it had given the requested instruction”). In any event, criminal jury instructions need not set forth the Polaroid multi-factor test because it is not contained in the statute. See McEvoy, 820 F.2d at 1172. As to how the comparison should be made between the counterfeit and legitimate products at trial, civil law suggests three principles. First, counterfeit and genuine marks should “be compared in their entireties” and “should not be dissected or split up into [] component parts [with] each part then compared with corresponding parts” because “[i]t is the impression that the mark as a whole creates on the average reasonably prudent buyer and not the parts thereof, that is important.” 4 J. Thomas McCarthy, McCarthy on Trademarks § 23:41 (4th ed. 2012) (footnote omitted); see also id. § 23:42. Second, because the average purchaser focuses on two marks’ similarities rather than their differences, the fact finder should do the same. Id. § 23:41. Third, whether the counterfeit and genuine marks should be compared side by side or serially depends on how the average consumer would encounter them in the market: “Where products in the relevant market are not typically displayed in the same locations, centering on whether they are likely to be distinguished when viewed simultaneously is incorrect, and will result in a faulty likelihoodof-confusion analysis.” Louis Vuitton Malletier v. Burlington Coat Factory Warehouse Corp., 426 F.3d 532, 534 (2d Cir. 2005) (Calabresi, J.) (discussing likelihood of confusing handbags); see also 4 McCarthy on Trademarks § 23:5859. But see Louis Vuitton Malletier v. Dooney & Bourke, Inc., 454 F.3d 108, 117 (2d Cir. 2006) (suggesting that side-by-side comparison may be acceptable to determine whether goods are identical). Finally, in a criminal case, even if some of the markings on the defendant’s goods deviate from those on the original and his goods are of noticeably poor quality, they are counterfeit so long as his goods bear at least one trademark identical to or substantially indistinguishable from the original. See United States v. Yi, 460 F.3d 623, 627 n.1, 629 n.4, 637 n.14 (5th Cir. 2006). 5. The Defendant Used the Counterfeit Mark “Knowingly” The final element required for a § 2320 offense is that the defendant “knowingly” used the counterfeit mark on or in connection with the trafficked goods or services. In cases involving labels, documentation, or packaging, the government must prove that the defendant trafficked in such items “knowing that a counterfeit mark has been applied thereto, the use of which is likely to cause confusion, to cause mistake, or to deceive.” § 2320(a) (as amended by the III.Trafficking In Counterfeit Marks 121 Stop Counterfeiting in Manufactured Goods Act, Pub L. No. 109-181, § 1, 120 Stat. 285 (2006)). To prove this element, the government must present evidence that the defendant had “an awareness or a firm belief ” that the mark used was counterfeit. See Joint Statement, 130 Cong. Rec. 31,674 (1984). Knowledge can also be proved with evidence that the defendant acted with willful blindness, conscious avoidance, or deliberate ignorance, which means the defendant “deliberately closed his eyes to what otherwise would have been obvious to him concerning the fact in question.” See United States v. Brodie, 403 F.3d 123, 132 (3d Cir. 2005) (quotation and citation omitted). “[I]f the prosecution proves that the defendant was ‘willfully blind’ to the counterfeit nature of the mark, it will have met its burden of showing ‘knowledge.’” Joint Statement, 130 Cong. Rec. 31,674 (1984) (citing United States v. Jewell, 532 F.2d 697 (9th Cir. 1976) (other citations omitted)); see also United States v. Hiltz, 14 Fed. Appx. 17, 19 (1st Cir. 2001); United States v. Hamamoto, No. 99-10019, 2000 WL 1036199, *2 (9th Cir. July 27, 2000); cf. Tal S. Benschar et al., Proving Willfulness in Trademark Counterfeiting Cases, 27 Colum. J.L. & Arts 121, 125 (2003). Although certain circuits may be generally reticent to allow proof of willful blindness to satisfy actual knowledge in criminal cases, Congress’s specific intent with respect to § 2320(a) should trump that reluctance in these cases. On the other hand, “a manufacturer who believes in good faith that he or she has a prior right to use a particular mark, or that a mark does not infringe a registered mark, could not be said to ‘know’ that the mark is counterfeit.” Joint Statement, 130 Cong. Rec. 31,674 (1984). The government may prove the defendant’s knowledge or willful blindness of a counterfeit mark through direct or circumstantial evidence. Circumstantial evidence could include evidence that: • • • • 122 the defendant purchased or sold goods after notice of potential infringement; the defendant knew that the victim distributed its goods only through authorized dealers, when the defendant and his supplier were not authorized dealers; the goods came from a questionable supplier; the defendant or his source used coded invoices for branded merchandise; Prosecuting Intellectual Property Crimes • • the goods were of inferior quality; or the goods were bought or sold for an unusually low price. Cf. Tal S. Benschar et al., Proving Willfulness in Trademark Counterfeiting Cases, 27 Colum. J.L. & Arts 121, 130-35 (2003) (discussing civil cases). For more case examples, see United States v. Lam, 677 F.3d 190, 200 n.10 (4th Cir. 2012) (finding that “[t]he government presented ample evidence at trial to allow a reasonable jury to conclude that Appellants were aware that the marks on their handbags and wallets were counterfeit, including evidence of: their use of multiple shell companies and multiple ports to import the counterfeit goods, the manner in which they transported and concealed the counterfeit merchandise, the civil lawsuit Burberry instituted against them, and the multiple seizure notices they received from CBP”); United States v. Barry, 390 Fed. Appx. 949, 950-51 (11th Cir. 2010) (per curiam); United States v. Garrison, 380 Fed. Appx. 423, 426 (5th Cir. 2010) (per curiam) (sufficient evidence of deliberate indifference existed where defendant was previously notified that the merchandise he was selling was counterfeit, he knew he did not have necessary license to sell trademarked merchandise, and cost of merchandise was very low); United States v. Hatem Abu Hassan, 280 Fed. Appx. 271, 274 (4th Cir. 2008) (per curiam) (defendant knew pills sold to an undercover officer were counterfeit because defendant assured the undercover officer the pills were “effective” and provided the undercover officer with a free sample of the pills, the packaging of the counterfeit pills did not indicate their source, and defendant had an “abundant supply” of the pills); United States v. George, 233 Fed. Appx. 402, 404-05 (5th Cir. 2007) (per curiam) (evidence was sufficient to prove willful blindness where, inter alia, licensed pharmacist knew prices he was paying for drugs were far below market rate and he failed to inquire about the legitimacy of the medication); United States v. Park, 164 Fed. Appx. 584, 585-86 (9th Cir. 2006) (holding that government demonstrated knowing use of a counterfeit mark by introducing settlement agreement from an earlier civil action between defendant and victim in which she had agreed not to sell identical merchandise with which she was caught in criminal case) (unpublished); United States v. Yi, 460 F.3d 623, 629-30 (5th Cir. 2006) (jury could conclude that defendant knew the marks were counterfeit, notwithstanding his numerous factual counterarguments, in light of the defendant’s admissions, attempt to bribe a Customs agent, receipt of cease-anddesist letters, and the counterfeit goods’ poor quality); United States v. Guerra, 293 F.3d 1279, 1287-88 (11th Cir. 2002) (citing defendant’s knowledge that III.Trafficking In Counterfeit Marks 123 the counterfeit labels he produced were not all being sold to authorized dealers of Cuban cigars and that the purchasers of defendant’s counterfeit labels did not purport to be authorized dealers themselves); United States v. Jewell, 532 F.2d 697, 699-702 (9th Cir. 1976) (upholding willful blindness instruction when defendant had declined to buy drugs from a stranger but then agreed to drive the stranger’s car from Mexico to the United States for $100, while he suspected there was something wrong or illegal with the car and examined the car but avoided investigating an apparently hidden compartment in the trunk that was later found to contain drugs) (cited in § 2320’s legislative history); United States v. Hamamoto, No. 99-10019, 2000 WL 1036199, at *1 (9th Cir. July 27, 2000) (reasoning that knowledge element satisfied by evidence that defendant, a customs agent in Guam, received bribes to clear airway bills for goods imported from Korea, a primary source of counterfeit goods to Guam); United States v. Sung, 51 F.3d 92, 93-94 (7th Cir. 1995) (holding that although the victim’s genuine mark was not always identified with the symbol, defendant’s knowledge that the “marks were on the bottles, caps, and boxes” of the counterfeit shampoo he sold sufficed because § 2320(f )(1) (A)(ii) imposes on the defendant “the duty to inquire about the status of the mark”); United States v. Rodriguez, Nos. 88-1125, 88-1127, 1989 WL 69934, at *2 (9th Cir. June 23, 1989) (citing defendant’s own distinction between “phony” and “real” Rolex watches, defendant’s inability to sell the counterfeits at work, and defendant’s admission that she had to be quiet about selling them); United States v. McEvoy, 820 F.2d 1170, 1172-73 (11th Cir. 1987) (rejecting defendants’ contention that § 2320 was unconstitutionally vague because defendants appeared to know “that their actions in selling the watches violated the law,” particularly when defendants admitted that the watches seized by the government contained trademarks virtually identical to registered trademarks for Rolex, Piaget, and Gucci). ® For a case in which circumstantial evidence was insufficient, consider United States v. Sultan, 115 F.3d 321 (5th Cir. 1997). In Sultan, the defendant shared a warehouse with an auto parts dealer who obtained re-manufactured auto parts and altered them to make them look new. Id. at 323-24. Although the two businesses were kept separate, the defendant purchased a large amount of merchandise from the auto parts dealer. Id. at 324. In holding that the government failed to show that the defendant knew that he was selling counterfeit parts, the Fifth Circuit largely rejected the government’s circumstantial evidence of knowledge, including: 124 Prosecuting Intellectual Property Crimes • • • • • The defendant’s penchant for thriftiness and knowledge of market prices. Id. at 326. The defendant’s inconsistent statements to investigators (because he may have made these statements for non-criminal reasons). Id. The defendant shared the warehouse space with the auto parts dealer (which alone was not sufficient because the defendant’s mere presence in a climate of criminal activity could not serve as a basis for conviction). Id. at 328. The counterfeit parts’ low prices (which alone were not sufficient evidence of knowledge when there were legal ways to obtain goods at this price range and the defendant was paying 80% to 90% of the market price for legitimate distributors). Id. at 329. Evidence of the defendant’s knowledge regarding legitimate packaging (because there was no evidence that the defendant was aware that the packaging materials stored by the auto parts dealer were counterfeit, particularly when one witness never saw the defendant in the counterfeit room and another witness testified that the defendant kept his inventory separate from the auto parts dealer). Id. at 329-30. Holding that this circumstantial evidence required the jury to go “beyond making reasonable inferences” by “making unreasonable leaps,” the court reversed the conviction on the ground that there was insufficient evidence to support the jury’s finding that the defendant knowingly used a counterfeit mark beyond a reasonable doubt. Id. at 330. The government need not prove that the defendant knew that the mark he counterfeited was registered with the United States Patent and Trademark Office. See Section B.4.c. of this Chapter. Nor must the government prove that the defendant knew that his conduct constituted a crime. Hamling v. United States, 418 U.S. 87, 123 (1974); United States v. Baker, 807 F.2d 427, 42830 (5th Cir. 1986); United States v. Yu Chunchai, No. 10-50540, 2012 WL 1332404, at *1 (9th Cir. Apr. 18, 2012) (unpublished) (“The statute does not require that the government prove that the defendant knew that his conduct was illegal ....”). And at least one unpublished Ninth Circuit opinion has held that the government need not prove that the defendant “knew that the mark was likely to cause confusion.” Yu Chunchai, 2012 WL 1332404, at *1. Finally, in Lam, the Fourth Circuit held that defendants waived their right to raise for the first time on appeal a sufficiency challenge to a jury’s finding that defendants knowingly used a counterfeit mark where defendants failed III.Trafficking In Counterfeit Marks 125 to raise that challenge in an earlier Rule 29(c) motion raising other specific grounds for challenging their § 2320 conviction. 677 F.3d at 200. 6. Trafficking in Counterfeit Military Goods or Services The National Defense Authorization Act for FY 2012 (“NDAA”), Pub. L. No. 112-81, 125 Stat. 1298 (2011), amended § 2320 to create a new offense for trafficking in “counterfeit military goods or services.” Specifically, the new offense provides enhanced criminal penalties for anyone who: traffics in goods or services knowing that such good or service is a counterfeit military good or service the use, malfunction, or failure of which is likely to cause serious bodily injury or death, the disclosure of classified information, impairment of combat operations, or other significant harm to a combat operation, a member of the Armed Forces, or to national security.... 18 U.S.C. § 2320(a)(3). The amendments also define the new term “counterfeit military good or service”: the term “counterfeit military good or service” means a good or service that uses a counterfeit mark on or in connection with such good or service and that— (A) is falsely identified or labeled as meeting military specifications, or (B) is intended for use in a military or national security application... 18 U.S.C. § 2320(f )(4). Although the new “counterfeit military good” offense is located in a separate subsection (§ 2320(a)(3)) from the preexisting counterfeit goods offense (§ 2320(a)(1)), a charge under the “counterfeit military” provision will require proving essentially all the same elements of a traditional counterfeit goods charge under § 2320(a)(1), plus several additional elements. That is, a § 2320(a)(3) charge requires that the defendant “traffic” in “goods or services,” and must act “knowing[ly],” just as in § 2320(a)(1). Whereas § 2320(a)(1) requires that the defendant “knowingly use a counterfeit mark on or in connection with such good or service,” § 2320(a)(3) requires that the defendant act “knowing that such good or service is a counterfeit military good or service.” A “counterfeit military good or service” is defined as a good or service “that uses a counterfeit mark on or in connection with such good or service,” as well as meeting certain other criteria. 18 U.S.C. § 2320(f )(4). 126 Prosecuting Intellectual Property Crimes The counterfeit military good or service offense can thus be thought of as an enhancement of the traditional § 2320(a)(1) “counterfeit goods” charge, where certain additional elements are met. Some of those elements are set forth in the definition of “counterfeit military good or service,” while other elements are included in the offense language in § 2320(a)(3). a. “Counterfeit Military Good or Service” As noted above, to qualify as a “counterfeit military good or service” the good or service must “use[] a counterfeit mark on or in connection with such good or service.” 18 U.S.C. § 2320(f )(4). In addition, the good or service must also be either (A) falsely identified or labeled as meeting military specifications, or (B) intended for use in a military or national security application. To date no courts have had the opportunity to interpret the meaning of “counterfeit military good or service” in § 2320 and there is minimal legislative history regarding the specific language of the NDAA amendments to § 2320. The plain language of the statutory definition, however, indicates that to prove a violation of the “counterfeit military good or service” provision, the government will need to show either that the defendant knew the goods (or services) in question were falsely identified as meeting a military specification (such as a consumer semiconductor chip that is falsely represented or labeled as being a military grade chip), or alternatively, that the defendant intended that the goods or services be used in a military or national security application, or at least knew that the goods or services in which the defendants were trafficking were intended by others (e.g., the ultimate purchasers) for use in a military or national security application. Issues involving counterfeit parts in the military supply chain, which prompted the NDAA amendments, have been the subject of investigation by several government and Congressional bodies. See, e.g., U.S. Gov’t Accountability Office, GAO-12-375, Suspect Counterfeit Electronic Parts Can Be Found on Internet Purchasing Platforms (2012), available at http://gao.gov/ products/GAO-12-375 and GAO-10-389; U.S. Gov’t Accountability Office, GAO-10-389, DOD Should Leverage Ongoing Initiatives in Developing Its Program to Mitigate Risk of Counterfeit Parts (2010), available at http://www.gao. gov/products/GAO-10-389; U.S. Dep’t of Commerce, Defense Industrial Base Assessment: Counterfeit Electronics (2010), available at http://www.bis.doc.gov/ defenseindustrialbaseprograms/osies/defmarketresearchrpts/final_counterfeit_ electronics_report.pdf; S. Rep. No. 112-167 (2012) (Report of the Senate III.Trafficking In Counterfeit Marks 127 Committee on Armed Services); The Committee’s Investigation Into Counterfeit Electronic Parts in the Department of Defense Supply Chain: Hearing Before the Senate Committee on Armed Services, 112th Cong. (2011), available at http:// www.gpo.gov/fdsys/pkg/CHRG-112shrg72702/pdf/CHRG-112shrg72702. pdf. b. “Use, Malfunction, or Failure” is Likely to Cause Specified Harms To prove an offense under 18 U.S.C. § 2320(a)(3), the government must also demonstrate “the use, malfunction, or failure of [the counterfeit military good or service] is likely to cause” one of several specified harms: 1. 2. 3. 4. serious bodily injury or death; the disclosure of classified information; impairment of combat operations, or; other significant harm to a combat operation, a member of the Armed Forces, or to national security. Note that the government need not prove that such harms actually occurred, or that the use or failure of a counterfeit would necessarily cause one of the specified harms, but only that such harm would be “likely” to occur. 7. Trafficking in Counterfeit Drugs The Food and Drug Administration Safety and Innovation Act (“FDASIA”), Pub. L. No. 112-144, 126 Stat. 993 (2012) amended § 2320 to create a new offense for trafficking in “counterfeit” drugs. The amendments increase the criminal penalties for anyone who “traffics in a counterfeit drug.” 18 U.S.C. § 2320(a)(4). The amendments also create a new definition for the term “counterfeit drug”: the term “counterfeit drug” means a drug, as defined by section 201 of the Federal Food, Drug, and Cosmetic Act, that uses a counterfeit mark on or in connection with the drug. 18 U.S.C. § 2320(f )(6). The term “drug” is defined by reference to the definition used in the Food, Drug, and Cosmetic Act (FDCA), 21 U.S.C. § 321(g)(1). The FDCA broadly defines the term “drug” to include any articles recognized in official formularies or pharmacopoeia (§ 321(g)(1)(A)), any articles intended for use to treat or prevent disease (§ 321(g)(1)(B)), or any articles intended to affect the structure or any function of human or animal 128 Prosecuting Intellectual Property Crimes bodies (§ 321(g)(1)(C)), but generally does not include dietary supplements or food (§ 321(g)(1)(C)-(D)). Note that although 21 U.S.C. § 321(g) includes its own definition of “counterfeit drug” (see § 321(g)(2)),—the FDASIA’s new definition of “counterfeit drug” in 18 U.S.C. § 2320(f )(6) governs cases charged under § 2320(a)(4). As explained previously in Section B.1. of this Chapter, with respect to the new “counterfeit drug” offense, § 2320(a)(4), Congress failed to include the mens rea requirement—which exists for § 2320(a)(1)-(3)—that the government must prove that the defendant knowingly used a counterfeit mark. As of this writing, Congress has not yet amended this provision to correct the omission. However, in order to prove a charge under § 2320(a)(4), it is recommended that prosecutors prove the same elements of a traditional counterfeit goods charge under § 2320(a)(1) plus additional elements set forth in the definition of “counterfeit drug.” A “counterfeit drug” is defined as a drug, as defined by the FDCA in 21 U.S.C. § 321(g)(1), that “uses a counterfeit mark on or in connection with the drug.” 18 U.S.C. § 2320(f )(6). Just as the “counterfeit military good” offense discussed in the previous subsection, the counterfeit drug offense can be thought of as an enhancement of the traditional § 2320(a) (1) “counterfeit goods” charge. 8. Venue Venue is proper in any state through which counterfeit goods travel after the defendant obtains control over the goods. See United States v. DeFreitas, 92 F. Supp. 2d 272 (S.D.N.Y. 2000). In DeFreitas, the defendant imported counterfeit Beanie Babies from China to New Jersey via New York for eventual sale in New Jersey. Id. at 276. The defendant challenged his conviction under §§ 2320 and 371 (conspiracy) on the basis of improper venue in New York, arguing that the substantive offense under § 2320 did not begin until he received the counterfeit goods in New Jersey. The court rejected his argument by holding that trafficking is a continuing offense beginning with obtaining control over the counterfeit goods, continuing with transport, and ending with the transfer or disposal of the goods. Id. at 277. Because the offense began when the defendant purchased the counterfeit goods in China and directed that they be shipped to New Jersey, venue was proper at any point through which the goods traveled after they entered the United States, including the Southern District of New York. Id. III.Trafficking In Counterfeit Marks 129 C. Defenses Many general defenses, such as the absence of proper venue or jurisdiction, are available in every criminal case and their application needs no further elaboration here. The following discussion addresses defenses specific to § 2320. 1. Authorized-Use Defense: Overrun Goods The authorized-use defense excludes from the definition of counterfeit mark any mark that is used in connection with goods or services[, or a mark or designation applied to labels, patches, stickers, wrappers, badges, emblems, medallions, charms, boxes, containers, cans, cases, hangtags, documentation, or packaging of any type or nature used in connection with such goods or services,] of which the manufacturer or producer was, at the time of the manufacture or production in question[,] authorized to use the mark or designation for the type of goods or services so manufactured or produced, by the holder of the right to use such mark or designation. 18 U.S.C. § 2320(f )(1)(B). The bracketed language was inserted by the Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1(b)(3), 120 Stat. 285, 287 (2006), and thus applies only to offenses arising after that time. The authorized-use defense applies to “overrun” goods or services, that is, goods or services that an otherwise authorized manufacturer or producer makes and sells on the side without the mark-holder or licensor’s knowledge or approval. For instance, consider a trademark licensee who is authorized to make 500,000 umbrellas bearing the licensor’s trademark but who manufactures without authorization an additional 500,000 umbrellas bearing that mark during the course of the license. Joint Statement, 130 Cong. Rec. 31,676 (1984). Because the trademark owner in this situation can protect himself through “contractual and other civil remedies,” Congress felt that it was “inappropriate to criminalize such practices.” Id. Thus, “[i]f a licensee manufactures overruns during the course of the valid license, the marks on those goods will remain noncounterfeit for purposes of this act.” Id. 130 Prosecuting Intellectual Property Crimes The overrun goods defense attaches to the overrun goods themselves, not just to the party who produced them. This follows from § 2320(f )(1)(B)’s specification that overrun goods are not counterfeit. Consequently, any overrun goods that are produced and completed during the course of the license remain noncounterfeit even after the license runs out, Joint Statement, 130 Cong. Rec. 31,676 (1984), and the defense is available to any party who traffics in overrun goods downstream of the manufacturer. The legislative history behind §2320(f )(1)(B) shows Congress’ intent that the overrun goods defense be an affirmative defense; “the burden [is] on the defendant to prove that the goods or services in question fall within the overrun exclusion.” Joint Statement, 130 Cong. Rec. 31,676 (1984). The overrun goods defense does not, however, allow counterfeiters to escape criminal liability by attaching real or overrun labels to counterfeits. As discussed in Section B.4.a. of this Chapter (citing 4 McCarthy on Trademarks and Unfair Competition § 25:15 (4th ed. 2012) and United States v. Petrosian,126 F.3d 1232, 1234 (9th Cir. 1997)), it is standard trademark law—both civil and criminal—that a genuine or authentic mark becomes counterfeit when it is used in connection with something else that is counterfeit. As revised, the authorized-use exception provides that a counterfeit mark “does not include any mark or designation used in connection with goods or services, or a mark or designation applied to labels, ... documentation, or packaging of any type or nature used in connection with such goods or services, of which the manufacturer or producer was, at the time of the manufacture or production in question, authorized to use the mark or designation for the type of goods or services so manufactured or produced, by the holder of the right to use such mark or designation.” 18 U.S.C. § 2320(f )(1)(B) (emphasis added) (numbered § 2320(e) (1) prior to Dec. 31, 2011). The 2006 amendments reworded the authorizeduse exception to retain its focus on whether the goods and services are overrun, rather than whether the labels, documentation, or packaging themselves are overrun. As before, the text focuses on the authorization of the manufacturer or producer of the goods and services, not the manufacturer or producer of the labels, documentation, or packaging. Interpreting the amendment differently would cause a major change in trademark law, one which Congress would have signaled in much clearer terms had the change been intended. Given that the 2006 amendments were intended to strengthen the government’s ability to prosecute cases concerning counterfeit labels, documentation, and packaging, and the legislative history indicates nothing to the contrary, the authorized-use exception should still allow the government to prosecute those III.Trafficking In Counterfeit Marks 131 who use or traffic in real or overrun labels, documentation, or packaging to turn inauthentic goods into counterfeits. The overrun defense does have a few limitations. First, “the overrun exemption does not apply if a licensee produces a type of goods in connection with which he or she was not authorized to use the trademark in question.” Joint Statement, 130 Cong. Rec. 31,676-77 (1984). For example, “if a licensee is authorized to produce ‘Zephyr’ trench coats, but without permission manufactures ‘Zephyr’ wallets, the overrun exception would not apply.” Id. at 31,677. In this example, the licensee could be prosecuted for producing the wallets only if the ‘Zephyr’ mark was registered for use on wallets as well as trench coats. See also Section B.4.f. of this Chapter. Second, the overrun goods defense is limited to goods or services for which authorization existed “during the entire period of production or manufacture.” United States v. Bohai Trading Co., 45 F.3d 577, 580 (1st Cir. 1995). In Bohai, Stride Rite authorized the defendant to arrange for the manufacture of 200,000 pairs of its KEDS trademarked sneakers in China in 1987 and 1988. Id. at 578. Stride Rite terminated the defendant’s license in the spring of 1989, after which the defendant arranged for the Chinese factory to manufacture an additional 100,000 pairs of KEDS and to backdate the shoes as being produced in 1988. Id. at 578-79. The defendant then imported the shoes to the United States and sold them as genuine KEDS. Id. at 579. On appeal from its conviction, the defendant argued that § 2320 was unconstitutionally vague because it did not define the meaning of “production” within the authorized-use exception, and thus the defendant could not discern whether its conduct was illegal. The First Circuit disagreed, holding that the statute’s plain language clearly indicates that the licensee must have a valid trademark license at all stages of manufacture or production. Id. at 580-81. Stride Rite’s permission to assemble materials and train Chinese factory workers in 1988 (which the defendant argued was “production” within the meaning of § 2320) did not authorize him to apply the KEDS trademark to shoes in 1989 after his license was terminated. Id. The use of a licensee’s rejected irregular goods was addressed in United States v. Farmer, 370 F.3d 435 (4th Cir. 2004). In Farmer, the defendant purchased irregular garments without trademarks from legitimate manufacturers’ authorized factories, and had different companies sew or silk-screen on the manufacturers’ trademarks. Id. at 437-38. On appeal, the defendant argued that he had not “confuse[d] customers about the source of his goods” because the garments had been manufactured to the trademark holders’ specifications 132 Prosecuting Intellectual Property Crimes by factories from which the trademark holders themselves purchased. Id. at 440. The Fourth Circuit disagreed, reasoning that § 2320 focuses not on the quality of the counterfeit goods but on the counterfeit trademark attached to those goods and the right of trademark holders to control the manufacturing and sale of goods with their trademarks. Id. at 440-41. Although the decision did not specifically discuss the overrun goods defense, that defense likely would have been rejected because the garments had not been fully manufactured or produced until the marks were placed on them by the companies the defendant hired, which were not authorized by the trademark holders. Had the defendant instead purchased garments from authorized factories with the trademarks already on them, the overrun goods defense might have prevailed. The defendant bears the burden of proving “that the goods or services in question fall within the overrun exclusion, under both the criminal and civil provisions” by a preponderance of the evidence. Joint Statement, 130 Cong. Rec. 31,676 (1984). 2. Authorized-Use Defense: Gray Market Goods “Gray market goods,” also known as “parallel imports,” are “trademarked goods legitimately manufactured and sold overseas, and then imported into the United States” through channels outside the trademark owner’s traditional distribution channels. Joint Statement, 130 Cong. Rec. 31,676 (1984) (citing Bell & Howell: Mamiya Co. v. Masel Supply Co., 719 F.2d 42 (2d Cir. 1983)). As with overrun goods, the marks on gray market goods are placed there with the mark-holder’s authorization. What the mark-holder has not authorized is the sale of those foreign goods within the United States. Just as with overrun goods (discussed in Section C.1 of this Chapter), the authorized-use defense excludes parallel imports and gray market goods from the definition of a counterfeit mark because such a mark is “placed there with the consent of the trademark owner.” Joint Statement, 130 Cong. Rec. 31,676 (1984). Congress carefully considered “gray market” goods and intended that those who traffic in them not be prosecuted. Id.; S. Rep. No. 98-526, at 11 (1984), reprinted in 1984 U.S.C.C.A.N. 3627, 3637. Additionally, as with the overrun goods defense, the gray market goods defense is available not just to the party who produced the goods, but also to any party who traffics in them downstream, because § 2320(f )(1) (numbered § 2320(e)(1) prior to Dec. 31, 2011) declares that such goods are not counterfeit. Although there are no reported decisions directly on point, it is III.Trafficking In Counterfeit Marks 133 unlikely that a court would interpret the gray market or parallel import defense to be an affirmative defense. First, Congress drew a distinction between these defenses in the legislative history. While the legislative history makes clear that overrun goods are exempt from the definition of counterfeit by § 2320(f )(1) and that the defendant bears the burden of proving the goods at issue are overrun, Joint Statement, 130 Cong. Rec. 31,676 (1984), the Joint Statement makes no such statement about gray market goods. Furthermore, the Joint Statement expressly stated that the bill’s sponsors did not consider gray market and parallel import goods to meet the definition of counterfeit marks, because the marks were placed on the goods with the consent of the trademark owner or a person affiliated with the trademark owner. Id. This defense does not apply if the gray market goods were subsequently modified or remarked in a manner that made the new mark counterfeit. See Section C.3. of this Chapter. 3. Repackaging Genuine Goods When the defendant’s goods themselves are genuine and bear the trademark of the rights-holder but have been repackaged by the defendant, whether the defendant’s repackaging is criminal depends on whether he deceived the public or damaged the mark-owner’s good will. This rule ran through the cases, and was written into § 2320 by the Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1, 120 Stat. 285 (2006). United States v. Hanafy held that a defendant cannot be prosecuted under § 2320 for repackaging genuine goods with reproduced trademarks if the defendant did so without deceiving or confusing others. 302 F.3d 485 (5th Cir. 2002). In Hanafy, the defendants purchased individual cans of infant formula from various convenience stores and other sources and then repackaged the cans into trays for resale. Id. at 486. The defendants marked the shipping trays with reproductions of the can manufacturers’ trademarks and resold the trays to other wholesalers. Id. Although the cans had not been packaged by the original manufacturers for resale in this form, the defendants’ goods were genuine, unadulterated, and were sold within the “sell by” date. Id. The district court ruled that the unauthorized use of a reproduction of a mark in connection with genuine goods (that is, what the mark represents the goods to be) does not violate § 2320. Id. at 487-88. In so ruling, the court concluded that the repackaging rule of Prestonettes, Inc. v. Coty, 264 U.S. 359, 368-69 (1924), 134 Prosecuting Intellectual Property Crimes which applies to actions brought under the Lanham Act, does not apply to criminal prosecutions under § 2320. Hanafy, 302 F.3d at 488. Affirming the district court, the Fifth Circuit held that the shipping trays did not qualify as counterfeit under § 2320. Id. at 488-89. Although repackaging the goods without the manufacturer’s approval or control might violate civil trademark law, attaching a mark to trays containing the “genuine unadulterated, unexpired products associated with that mark does not give rise to criminal liability under section 2320.” Id. at 489. The court distinguished Petrosian, which involved fake Coca-Cola in real Coke bottles, because the infant formula in this case was genuine. Id. See also the discussion of Petrosian in Section B.4.a. of this Chapter. Thus, under Hanafy, a person usually cannot be prosecuted under § 2320 for repackaging goods with reproductions of the original trademark if the goods themselves are genuine and in the same condition that they would have been had the rights-holder distributed them itself. United States v. Milstein, 401 F.3d 53, 62-63 (2d Cir. 2005), confirmed that a defendant can be prosecuted under § 2320 if he repackages genuine goods to defraud consumers, such as by presenting fraudulent information. In Milstein, the defendant obtained drugs manufactured for foreign markets and repackaged them with false lot numbers and other markings to make the drugs appear as if they had been approved by the FDA for sale in the United States. 401 F.3d at 59-60. The repackaged drugs were not identical to the drugs manufactured for U.S. markets. Id. On appeal, the defendant cited Hanafy to argue that his repackaging did not violate § 2320. Id. at 62. The Second Circuit distinguished Hanafy because “[w]hile the cans in Hanafy were ‘merely being repackaged, such that consumers could be sure of the goods’ quality and source,’ ... the drugs here were repackaged so that consumers would believe foreign versions of the drug were in fact domestic, FDA-approved versions.” Id. (quoting United States v. Farmer, 370 F.3d 435, 441 n.1 (4th Cir. 2004) (citing Hanafy, 302 F.3d at 486)). The critical distinction was that Hanafy’s false marks “contained no more information than that which was carried on the cans themselves,” whereas “Milstein sold [drugs] in forged packaging bearing false lot numbers.” Id. (internal quotation marks and alterations omitted). See also United States v. Lexington Wholesale Co., 71 Fed. Appx. 507, 508 (6th Cir. 2003) (affirming restitution for a § 2320 conviction based on repackaging of loose cans of infant formula into cases that did not accurately reflect the “use by” date). III.Trafficking In Counterfeit Marks 135 In amending § 2320 in 2006, Congress essentially codified Hanafy and Milstein in a new subsection of § 2320: “Nothing in this section shall entitle the United States to bring a criminal cause of action under this section for the repackaging of genuine goods or services not intended to deceive or confuse.” 18 U.S.C. § 2320(g) (previously numbered as § 2320(f )). With respect to Hanafy, the legislative history explains that “[b]ecause the bill amends the definition of a counterfeit trademark to include packaging and labeling formats, which can be used lawfully by a variety of businesses, this language is intended to clarify that repackaging activities such as combining single genuine products into gift sets, separating combination sets of genuine goods into individual items for resale, inserting coupons into original packaging or repackaged items, affixing labels to track or otherwise identify genuine products, [and] removing genuine goods from original packaging for customized retail displays are not intended to be prosecuted as counterfeiting activities under the amended title 18 U.S.C. § 2320.” H.R. Rep. No. 109-68, at 8 & n.1 (2005). Congress also intended to codify the Milstein rule to allow prosecution of those who repackage genuine goods in a manner that defrauds consumers. In determining whether to prosecute such a case, the government is expected to “consider evidence tending to show an intent to deceive or confuse such as altering, concealing, or obliterating expiration dates, or information important to the consumer[‘s] use of the product such as safety and health information about the quality, performance, or use of the product or service; statements or other markings that a used, discarded, or refurbished product is new; or statements or other markings that the product meets testing and certification requirements.” Id. “Also relevant ... would be a meaningful variance from product testing and certification requirements, placing seals on product containers that have been opened and the original manufacturer’s seal has been broken, or altering or otherwise adulterating the genuine product.” Id. at 9. Although Hanafy and Milstein concern consumables such as food and drugs, similar issues arise in other industries. See, e.g., Intel Corp. v. Terabyte Int’l, Inc., 6 F.3d 614, 616, 620 (9th Cir. 1993) (holding defendants liable for infringement for purchasing and later distributing computer chips from a distributor who had relabeled the chips with a model number signifying a higher processing speed); Adobe Sys. Inc. v. One Stop Micro, Inc., 84 F. Supp. 2d 1086, 1088 (N.D. Cal. 2000) (holding defendants liable for infringement for sale of educational versions adulterated and repackaged as full retail versions). 136 Prosecuting Intellectual Property Crimes Section 2320(g) does not preempt the prosecution of deceptionless repackaging under statutes other than § 2320: “Nothing in this section shall entitle the United States to bring a criminal cause of action under this section for the repackaging of genuine goods or services not intended to deceive or confuse.” 18 U.S.C. § 2320(g) (emphasis added). For instance, repackaging cases that involve consumer products such as food, drugs, medical devices, cosmetics, and other items designed for consumers to use in the household, might be prosecuted under the product tampering statute, 18 U.S.C. § 1365, which addresses tampering with labels and communicating false information that a consumer product was tainted, or under the Food, Drug, and Cosmetic Act, 21 U.S.C. §§ 331(a), 333, 343, 352, 362, which punishes trafficking in misbranded food, drugs and cosmetics. See Section F. of this Chapter. 4. Lanham Act Defenses The Lanham Act’s civil defenses have been incorporated as defenses against criminal charges brought under § 2320 to the extent applicable. “All defenses, affirmative defenses, and limitations on remedies that would be applicable in an action under the Lanham Act [for trademark infringement] shall be applicable in a prosecution under this section.” 18 U.S.C. § 2320(d) (previously numbered § 2320(c) prior to Dec. 31, 2011); see also Joint Statement, 130 Cong. Rec. 31,675 (1984)( “only those defenses, affirmative defenses, and limitations on relief [in the Lanham Act] that are relevant under the circumstances will be applicable”). In addition, “any affirmative defense under the Lanham Act will remain an affirmative defense under this [section], which a defendant must prove by a preponderance of the evidence.” Id. Statutory defenses under the Lanham Act primarily address the incontestability of a mark once it has been registered for five years. 15 U.S.C. § 1115(b). The defenses to incontestability include: 1) fraud by the markholder in obtaining the registration; 2) abandonment of the mark by its owner; 3) the registered mark’s use by or with the registrant to misrepresent the source of the goods or services on or in connection with which the mark is used; 4) use of the name, term, or device charged to be an infringement is a use of the defendant’s individual name in his own business, or of someone in privity with that party, or a term that is used in good faith to describe the goods or services of such party or their geographic origin; 5) innocent and continuous prior use of the mark without registration by the defendant; 6) the defendant’s innocent prior use of the mark with registration; 7) use by the mark-holder of a trademark in violation of the antitrust laws; 8) the mark is functional; and III.Trafficking In Counterfeit Marks 137 9) equitable defenses, such as laches, estoppel, and acquiescence. Id. Other Lanham Act defenses or limitations mentioned prominently in the legislative history are those limitations on actions against printers and newspapers in 15 U.S.C. § 1114(2). For instance, the owner of an infringed mark is limited to an injunction against future printing under 15 U.S.C. § 1125(a). See 15 U.S.C. § 1114(2)(A); Joint Statement, 130 Cong. Rec. 31,675 (1984). For an extensive discussion of these defenses, see David J. Goldstone & Peter J. Toren, The Criminalization of Trademark Counterfeiting, 31 Conn. L. Rev. 1, 43-65 (1998). The applicability of the Lanham Act’s statute of limitations (or lack thereof ) is discussed in Section C.5. of this Chapter. Civil cases decided under the Lanham Act may prove instructive when applying the Lanham Act defenses in criminal cases, but those defenses should not be applied mechanically in a criminal case. For example, although an “unclean hands” defense may deny relief to a plaintiff mark-holder in a civil case, 15 U.S.C. § 1115(b)(3), (9); 37 C.F.R. § 2.114(b)(1) (2012), the markholder’s unclean hands are less relevant in a criminal case. This is because the mark-holder is not a party and the prosecutors act in the public’s interest rather than exclusively the mark-holder’s interest. Thus, application of this Lanham Act defense in a criminal case might not serve the public interest. At this writing, few criminal cases address the Lanham Act defenses. See, e.g., United States v. Milstein, 401 F.3d 53, 63-64 (2d Cir. 2005) (holding laches defense unavailable in § 2320 prosecutions); United States v. Sung, 51 F.3d 92, 94 (7th Cir. 1995) (discussing how 15 U.S.C. § 1111’s limitations on remedies in civil cases applies to criminal cases); United States v. Sheng, No. 92-10631, 1994 WL 198626 (9th Cir. 1994) (affirming denial of defendant’s motion for discovery concerning antitrust defense, due to defendant’s failure to make a prima facie case for discovery); United States v. Shinyder, No. 887236, 1989 WL 126528 (4th Cir. 1989) (per curiam) (holding that defendant failed to demonstrate ineffective assistance of counsel because defendant gave his attorney no information regarding purported invalidity of victim’s mark due to its prior use by defendant); United States v. Almany, 872 F.2d 924 (9th Cir. 1989) (appeal based on evidentiary issues related to Lanham Act defenses). 5. Statute of Limitations Under 18 U.S.C. § 3282(a), the statute of limitations for almost all noncapital federal crimes is five years unless otherwise expressly provided by law. 138 Prosecuting Intellectual Property Crimes Because § 2320 does not specify a limitations period itself, violations of § 2320 are subject to the general five-year limitations period. See United States v. Foote, 413 F.3d 1240, 1247 (10th Cir. 2005); United States v. Milstein, No. CR 96899 (RJD), 2000 WL 516784, at *1 (E.D.N.Y. 2000). Defendants, however, sometimes seek a shorter statute of limitations by arguing that the courts should apply the limitations period applicable to civil trademark violations. In Foote, for instance, the defendant argued that the statute of limitations should be determined by state law because § 2320(d) incorporates “[a]ll defenses, affirmative defenses, and limitations on remedies that would be applicable under the Lanham Act,” and courts apply state statutes of limitations to Lanham Act cases since the federal civil statute does not contain an express limitation period. Foote, 413 F.3d at 1247. The Tenth Circuit disagreed, holding that the lack of an “express statute of limitations in either the Counterfeit Trademark Act or the Lanham Act” means that the general criminal limitations period in § 3282(a) applies. Id.; see also United States v. Foote, 238 F. Supp. 2d 1271, 1276-77 (D. Kan. 2002) (containing an extended policy discussion of this issue). 6. Vagueness Challenges Courts have rejected challenges to § 2320 under the Fifth Amendment on vagueness grounds. A statute can be struck down as unconstitutionally vague if it either (1) fails to provide the kind of notice that will enable ordinary people to understand what conduct it prohibits, or (2) authorizes or encourages arbitrary and discriminatory enforcement. City of Chicago v. Morales, 527 U.S. 41, 56 (1999). Federal courts have uniformly rejected challenges to various terms within § 2320 as unconstitutionally vague. E.g., United States v. McEvoy, 820 F.2d 1170 (11th Cir. 1987) (rejecting claim that the Trademark Counterfeiting Act, 18 U.S.C. § 2320, is unconstitutionally vague on its face); United States v. Lam, 677 F.3d 190, 201-03 (4th Cir. 2012) (rejecting vagueness claim based on § 2320’s use of the phrase “substantially indistinguishable”); United States v. Bohai Trading Co., 45 F.3d 577 (1st Cir. 1995) (rejecting vagueness claim based on § 2320’s use of the phrase “at the time of the manufacture or production” in its “authorized-use” exception); United States v. Hon, 904 F.2d 803 (2d Cir. 1990) (rejecting claim that § 2320 is unconstitutionally vague as applied to “likelihood of confusion” jury charge); United States v. Diallo, 476 F. Supp. 2d 497 (W.D. Pa. 2007) (rejecting vagueness claim based on Congress’ decision not to define the term “use” in § 2320), aff’d, 575 F.3d 252 (3d Cir.), cert. denied, 130 S. Ct. 813 (2009). III.Trafficking In Counterfeit Marks 139 D. Special Issues 1. High-Quality and Low-Quality Counterfeits Defense counsel often argue that it is inappropriate to charge a § 2320 offense if the counterfeit goods are of very low or, conversely, very high quality, arguing that nobody is fooled by low-quality counterfeits and that nobody is harmed or deceived by high-quality counterfeits. Both arguments are misguided. See, e.g., United States v. Farmer, 370 F.3d 435 (4th Cir. 2004) (affirming conviction under § 2320 for irregular garments purchased from factories that manufactured garments to trademark holder’s specifications); United States v. Gonzalez, 630 F. Supp. 894, 896 (S.D. Fla.1986) (denying motion to dismiss § 2320 indictment because the counterfeits’ low price did not preclude finding that they could cause confusion, mistake or deception). The government’s response lies in the plain language of the statute. Subsections 2320(a) and (f ) focus on whether the counterfeit mark is likely to cause confusion, cause mistake, or to deceive and make no mention of the counterfeit item’s quality. See United States v. Foote, 413 F.3d 1240, 1246 (10th Cir. 2005) (“[T]he correct test is whether the defendant’s use of the mark was likely to cause confusion, mistake or deception in the public in general.”). As discussed in Section B.4.g. of this Chapter, § 2320 was “not just designed for the protection of consumers,” but also for “the protection of trademarks themselves and for the prevention of the cheapening and dilution of the genuine product.” United States v. Hon, 904 F.2d 803, 806 (2d Cir. 1990) (internal quotation marks and citations omitted). In this vein, “[o]ne of the rights that a trademark confers upon its owner is the ‘right to control the quality of the goods manufactured and sold’ under that trademark. For this purpose the actual quality of the goods is irrelevant; it is the control of quality that a trademark holder is entitled to maintain.” Farmer, 370 F.3d at 441 (internal quotation marks and citations omitted) (emphasis added). “When courts find that selling an item at an excessively cheap price precludes a finding that such an item is ‘counterfeit’ under 18 U.S.C. § 2320[] in that the use of the goods is not likely to cause confusion, to cause mistake, or to deceive, they are, in effect, thwarting the purposes behind such legislation.” Gonzalez, 630 F. Supp. at 896; United States v. Torkington, 812 F.2d 1347, 1350 n.3 (11th Cir. 1987) (holding that Gonzalez “adopted essentially the same interpretation that we do here”). 140 Prosecuting Intellectual Property Crimes Because both high-quality and low-quality counterfeit goods affect the intellectual property rights of the trademark holder, a § 2320 charge can be appropriate in either circumstance. See also Section B.4.g. of this Chapter. 2. Counterfeit Goods with Genuine Trademarks Although the definition of “counterfeit mark” in § 2320(f ) indicates that the mark itself must be counterfeit, not the good to which it is attached, a genuine or authentic mark becomes counterfeit when it is applied to counterfeit goods. See the discussion of United States v. Petrosian, 126 F.3d 1232 (9th Cir. 1997), in Section B.4.a. of this Chapter. Genuine trademarks can also become counterfeit when they are applied to genuine product in a manner that misrepresents the genuine product’s quality. See Section C.3. of this Chapter. 3. Selling Fakes While Admitting That They Are Fakes Defendants who disclose to consumers that their merchandise is counterfeit may not argue successfully that no criminal liability should attach because their customers were not deceived into thinking they were purchasing genuine goods. See Section B.4.g. of this Chapter. 4. Selling Another’s Trademarked Goods As One’s Own (Reverse Passing-Off) Agents sometimes inquire whether a target can be prosecuted for criminal trademark infringement if he sells another’s goods as his own under his own trademark, such as selling stolen Marlboro cigarettes as his own Acme brand cigarettes. This conduct, called “reverse passing-off,” is civilly actionable under the Lanham Act. See, e.g., Dastar Corp. v. 20th Century Fox Film Corp., 539 U.S. 23, 32-37 (2003); Web Printing Controls Co. v. Oxy-Dry Corp., 906 F.2d 1202 (7th Cir. 1990); Arrow United Indus., Inc. v. Hugh Richards, Inc., 678 F.2d 410, 416 (2d Cir. 1982); Smith v. Montoro, 648 F.2d 602, 606 & n.5 (9th Cir. 1981). Reverse passing-off is not a crime under § 2320, however, because it does not involve the use of a counterfeit mark as defined in § 2320(f ). In the example above, the defendant’s own Acme mark would be, in fact, a genuine mark. III.Trafficking In Counterfeit Marks 141 5. Mark-Holder’s Failure to Use ® Symbol The trademark code requires the holder of a federally registered mark to give others notice of registration by displaying the mark with the words “Registered in U.S. Patent and Trademark Office,” “Re. U.S. Pat. & Tm. Off.,” or the familiar ® symbol. Without this notice next to its mark on its goods and services, the mark-holder cannot recover its profits or damages against an infringer unless the infringer had actual notice of the registration. 15 U.S.C. § 1111. The commonly-seen TM and SM symbols do not give notice of federal registration; they can be used with unregistered marks. 3 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition § 19:148 (4th ed. 2012). The victim’s intentional or inadvertent failure to use the statutory means of notice mentioned above does not preclude the defendant’s prosecution under § 2320. United States v. Sung, 51 F.3d 92, 93-94 (7th Cir. 1995). Section 2320 criminalizes counterfeiting “whether or not the defendant knew [the victim’s] mark was so registered.” 18 U.S.C. § 2320(f )(1)(A)(ii); Sung, 51 F.3d at 93-94. Moreover, the notice provisions in 15 U.S.C. § 1111 do not create a defense that excuses infringement, but rather they only limit the mark-holder’s remedies. Sung, 51 F.3d at 94; see also 3 McCarthy on Trademarks and Unfair Competition § 19:144 (“Failure to use the statutory symbol does not create a defense: it is merely a limitation on remedies.”) (footnote omitted). For a discussion of how these remedies are limited in criminal cases, see Section E.3. of this Chapter. 6. Storage Costs and Destruction Unlike many other intellectual property crimes, criminal trademark infringement frequently generates a substantial quantity of physical evidence. Although large intellectual property seizures can be a problem to store, storage is the safest option. (Chapter X of this Manual discusses whether victims may assist with storage.) If storage is not feasible, part of the evidence probably can be destroyed after a hearing if the seized property is counterfeit. Destruction of the evidence, however, carries its own complications with respect to making evidence available for defendants and jurors to inspect and employing sound procedures for taking representative samples. The decision to allege all or only a part of the seized intellectual property in the indictment and at trial must be made on a case-by-case basis. In most cases, it should be possible either to indict for all seized goods and present 142 Prosecuting Intellectual Property Crimes evidence of a representative sample to prove the whole at trial, or to indict and present evidence of only some of the goods, using evidence of the full quantity as relevant conduct only at sentencing. (Chapter VIII’s discussion of determining the infringement amount considers the justification for and methods of estimation.) Charging a subset for trial and proving the remainder at sentencing may also have some tactical advantages, such as streamlining the trial and deferring loss calculations to the sentencing phase. Because these issues can become quite complex, prosecutors should consider them early on, even before the search is conducted. If the prosecutor wants all the evidence to be available for trial, it is important to coordinate with the seizing agency to ensure that any forfeited material is not destroyed or is at least destroyed only after a sound procedure for taking representative samples is completed. (Of course, destruction is not permissible until the items have been forfeited.) Prosecutors can discuss these issues with the Computer Crime and Intellectual Property Section at (202) 514-1026. 7. Units of Prosecution Because a defendant often traffics in numerous counterfeit trademarks, drafting an indictment that reflects the defendant’s actions is not always easy. The United States Department of Justice’s Criminal Resource Manual 215, available at http://www.usdoj.gov/usao/eousa/foia_reading_room/usam/ title9/crm00215.htm, advises that “all United States Attorneys should charge in indictments and informations as few separate counts as are reasonably necessary to prosecute fully and successfully and to provide for a fair sentence on conviction”; it also generally recommends charging no more than fifteen counts. But trademark counterfeiters of any significant size will often have infringed numerous trademarks in numerous transactions. The charging determination in a trademark counterfeiting case, as in other criminal cases, is subject to the rule of reason, and generally the best approach is to organize charges around specific courses of conduct in order to keep the case as straightforward as possible for the jury. Counts may be organized by the mark infringed; the identity of the mark-holder; or the date upon which the infringing goods were obtained, manufactured, distributed, or seized. Indictments charging counterfeiting schemes can be unified through a conspiracy count. III.Trafficking In Counterfeit Marks 143 If the defendant infringed only one trademark, the defendant can be charged with a single count. Separate sales of goods bearing the same counterfeit mark, however, have sometimes been charged in separate counts. See, e.g., United States v. Gantos, 817 F.2d 41, 42 (8th Cir. 1987) (defendant charged and convicted on four counts, each for separate sales of counterfeit Rolex watches). If the defendant counterfeited multiple marks, the indictment may also contain separate counts for each separate genuine mark. For example, in United States v. Song, 934 F.2d 105 (7th Cir. 1991), the court upheld the defendant’s conviction on five separate counts “because she was trafficking in goods bearing five different counterfeit marks.” Id. at 109. The court relied on the plain language of § 2320, which punishes someone who “‘intentionally traffics or attempts to traffic in goods or services and knowingly uses a counterfeit mark’ on such goods or services.” Id. at 108 (quoting the then-current version of 18 U.S.C. § 2320(a)) (emphasis in original) (footnote omitted). The courts have not yet addressed several charging issues that will continue to arise in trademark prosecutions: • • • 144 Whether a single sale of multiple items that infringe multiple trademarks may be charged in a single counterfeiting count. The issue is whether such a charge would be duplicitous—i.e., charging two or more distinct offenses in a single count—or rather just an allegation that multiple means were used to commit a single offense. Prosecutors who confront this issue should consult the Department’s manual, Office of Legal Education, U.S. Dep’t of Justice, Federal Grand Jury Practice § 11.30 (2008) (concerning duplicitous indictments), available at http:// dojnet.doj.gov/usao/eousa/ole/usabook/gjma/11gjma.htm#11.30. How multiple counterfeit trademarks on a single good should be charged in a criminal indictment: as one count, using the counterfeit good as the unit of prosecution, or as multiple counts, using each mark as a unit of prosecution. Whether a defendant who traffics in a counterfeit good wrapped in counterfeit packaging may be charged in one count that covers both the good and packaging and/or whether charging the good and packaging separately in multiple counts is necessary or permissible, now that § 2320 (as amended 2006) criminalizes trafficking in counterfeit labels, documentation, and packaging in addition to counterfeit goods and services. Prosecuting Intellectual Property Crimes 8. Olympic Symbols The definition of “counterfeit mark” in § 2320(f )(1)(B) includes designations protected by the Olympic Charter Act, such as the five interlocking rings of the Olympic games. See also 36 U.S.C. § 220506(a)(2) (giving the United States Olympic Committee exclusive rights to the symbol of the International Olympic Committee, consisting of 5 interlocking rings, the symbol of the International Paralympic Committee, consisting of 3 TaiGeuks, and the symbol of the Pan-American Sports Organization, consisting of a torch surrounded by concentric rings). Some of the rules that apply to prosecutions involving other marks do not apply to cases involving the Olympic symbols: • • • • The mark need not have been registered on the principal register in the USPTO. Section 2320(f )(1)(A)’s registration requirements do not apply to cases dealing with criminal trademark infringement of Olympic symbols. Compare 18 U.S.C. § 2320(f )(1)(A)(ii) with § 2320(f )(1)(B); see also 36 U.S.C. § 220506; Joint Statement, 130 Cong. Rec. 31,675 (1984) (explicitly exempting cases involving Olympic symbols from the registration requirement). See also the discussion of registration in Section B.4.c. of this Chapter. Section 2320(f )(1)(A)(ii)’s use requirement does not apply to cases involving protected Olympic symbols. See also the discussion of use in Section B.4.d. of this Chapter. The requirement that the defendant have used the counterfeit mark in connection with the goods or services for which the mark had been registered does not apply to cases involving protected Olympic symbols. See also Section B.4.f. of this Chapter. In cases involving protected Olympic symbols, the mark is counterfeit under 18 U.S.C. § 2320(f )(1)(B) if the defendant’s counterfeit symbols are “identical with, or substantially indistinguishable” from the genuine symbols. No further proof of likely confusion, mistake, or deception is required. See also Section B.4.g. of this Chapter. The other rules discussed in this Chapter apply equally to cases involving Olympic symbols. III.Trafficking In Counterfeit Marks 145 E. Penalties 1. Fines and Imprisonment For violations of § 2320(a)(1) (goods or services) or (a)(2) (labels, etc.), the maximum penalty for a first offense is up to 10 years imprisonment and a $2 million fine for an individual defendant and up to $5 million for organizational defendants. 18 U.S.C. § 2320(b)(1)(A). Subsequent offenses are subject to penalties of up to 20 years imprisonment and a $5 million fine for an individual defendant and up to $15 million for organizational defendants. Id. § 2320(b) (1)(B). For violations of § 2320(a)(3) and (a)(4), involving counterfeit military goods or services and counterfeit drugs, respectively, the maximum penalty is imprisonment up to 20 years and a fine of up to $5 million for individuals and up to $15 million for organizational defendants. Id. § 2320(b)(3)(A). Subsequent offenses are subject to up to 30 years imprisonment and a $15 million fine for individuals and up to $30 million fine for organizational defendants. Id. § 2320(b)(3)(B). If a defendant knowingly or recklessly causes or attempts to cause serious bodily harm or death by any of the offenses listed in subsection 2320(a), enhanced penalties may be available under § 2320(b)(2). In the case of serious bodily injury the statutory penalty is up to 20 years’ imprisonment and a $5 million fine for an individual and up to $15 million for an organizational defendant. The fines are the same in the case of death, however, an individual is subject to life imprisonment. Id. § 2320(b)(2)(A), (B). A challenge to incarceration, probation, and supervised release, on the ground that these remedies are not present in the civil Lanham Act, was rejected in United States v. Foote, No. CR.A. 00-20091-01-KHV, 2003 WL 22466158, at *2-3 (D. Kan. July 31, 2003), aff’d in part on other grounds, 413 F.3d 1240 (10th Cir. 2005). 2. Restitution The 2006 amendments to § 2320 expressly provided for restitution to victims of trademark counterfeiting. The amendments codified the prior practice in which restitution was awarded under 18 U.S.C. § 3663A(c)(1) (A)(ii), which provides mandatory restitution to victims of crimes against property in Title 18, and under Section 5E1.1 of the Sentencing Guidelines, 146 Prosecuting Intellectual Property Crimes which provides restitution when there is an identifiable victim and restitution is authorized under 18 U.S.C. § 3663A. See, e.g., United States v. Lexington, 71 Fed. Appx. 507, 508 (6th Cir. 2003) (affirming contested restitution order under 18 U.S.C. § 3663 and U.S.S.G. § 5E1.1 following a § 2320 conviction); United States v. Hanna, No. 02 CR.1364-01 (RWS), 2003 WL 22705133, at *3 (S.D.N.Y. Nov. 17, 2003) (including restitution in sentence for § 2320 conviction). See also Chapter VIII of this Manual. The 2008 PRO-IP Act revised § 2320’s restitution provision to refer to 18 U.S.C. § 2323, the general forfeiture and restitution provision for IP offenses also created by the PRO-IP Act. Section 2323(c), provides that “[w]hen a person is convicted of an offense under [§ 2320, inter alia], the court, pursuant to sections 3556, 3663A, and 3664 of [title 18], shall order the person to pay restitution to any victim of the offense as an offense against property referred to in section 3663A(c)(1)(A)(ii).” 18 U.S.C. § 2320(c). This provision does not mean that restitution will be proper in every § 2320 case, but rather that restitution shall be ordered under 18 U.S.C. § 3663A(c)(1)(A)(ii) if there is a victim who was harmed in a manner that would entitle him to restitution as the victim of a property crime. Before the 2008 amendments, § 2320 expressly defined the term “victim” as having “the meaning given that term in section 3663A(a)(2),” that is, “a person directly and proximately harmed as a result of the commission of an offense for which restitution may be ordered.” See § 2320(b)(5) (2008). That express reference to § 3663A(a)(2) was removed when the specific restitution language in § 2320 was replaced with a reference to the IP forfeiture and restitution provision in § 2323 by the PRO-IP Act in 2008. Although § 2323 does not define the term “victim,” there is no language in the PRO-IP Act or its legislative history to indicate that Congress intended these amendments to alter the definition of “victim” for § 2320 purposes, or to refer to any definition other than that provided in § 3663A(a)(2). Even under that definition, however, there remains some question whether a mark-holder qualifies for restitution if the defendant’s conduct did not diminish the mark-holder’s sales. See also Chapter VIII of this Manual. The restitution amount should be determined by calculating only “the actual amount [of infringing goods] placed into commerce and sold.” United States v. Beydoun, 469 F.3d 102, 108 (5th Cir. 2006). Although infringing items intended to be sold (but not actually sold) may be included in valuing loss for sentencing purposes, such goods should not be included in calculating III.Trafficking In Counterfeit Marks 147 restitution. Id. at 107-108. Furthermore, since the purpose of restitution is to compensate victims for actual losses, restitution should be based on the legitimate seller’s gross, rather than net, lost profits. Id. at 108. In § 2320 cases, the victim’s right to restitution may be subject to an important qualification: the Lanham Act’s limitation on remedies in 15 U.S.C. § 1111. In civil cases, 15 U.S.C. § 1111 prohibits a plaintiff from recovering monetary damages from a defendant who lacked actual notice that the plaintiff’s mark was registered. One court has ruled that 15 U.S.C. § 1111 limits restitution in a § 2320 prosecution because § 2320 incorporates civil Lanham Act defenses. United States v. Sung, 51 F.3d 92, 94 (7th Cir. 1995) (“[R]estitution in a criminal case is the counterpart to damages in civil litigation,” and thus “restitution payable to the trademark owner is proper only if the goods contained the proper notice or the infringer had actual knowledge of the registration.”). In Sung, the Seventh Circuit held that specific findings on these points—proper notice or actual knowledge of the registration—must be made by the sentencing court on the record before ordering restitution. Id. See the discussion of what constitutes proper notice in Section D.5. of this Chapter. For cases addressing how to prove notice or the defendant’s actual knowledge of registration, see United Servs. Auto. Ass’n v. Nat’l Car Rental Sys. Inc., No. Civ. A.SA00CA1370G, 2001 WL 1910543, at *4 (W.D. Tex. Sept. 26, 2001) (holding that “actual notice requirement is met when a party receives information portraying a registered trademark bearing a ® symbol,” including a letter asking the defendant to cease and desist); Schweitzz Dist. Co. v. P & K Trading Inc., No. 93 CV 4785, 1998 WL 472505, at *5 (E.D.N.Y. July 16, 1998) (holding that defendant’s testimony that it was aware of plaintiff’s use of the ® symbol on the open market sufficed to prove notice). Even if other courts follow the Seventh Circuit’s holding in Sung, two points are worth noting. First, the defendant’s knowledge or notice of the registration is not a defense to a criminal conviction; it is only a limitation on remedies. See Sung, 51 F.3d at 93-94. See also Section D.5. of this Chapter. Second, the rule should not limit restitution to any consumers whom the defendant defrauded. Sung’s holding was stated only in terms of restitution to the markholder, and its rationale should not be extended to consumers who have no say in whether the mark-holder gave the defendant notice. See Sung, 51 F.3d at 94 (noting that “as a form of money damages, restitution [is] payable to the trademark owner”) (emphasis added); cf. United States v. Foote, 413 F.3d 1240, 1252 (10th Cir. 2005) (holding Sung inapplicable to criminal fines because 148 Prosecuting Intellectual Property Crimes “[t]he court’s conclusion in Sung was based on its reasoning that restitution is a form of money damages payable to the trademark owner. Unlike restitution [to the trademark owner], fines are a form of criminal punishment rather than a form of damages, and are payable to the government rather than to the trademark owner.”) (citation omitted). For a more in-depth discussion of restitution in intellectual property crimes, such as whether a trademark-holder can be awarded restitution even if the defendant did not cost the trademark-holder any sales, see Chapter VIII of this Manual. 3. Forfeiture Forfeiture is covered in Chapter VIII of this Manual. 4. Sentencing Guidelines The applicable sentencing guideline is U.S. Sentencing Guidelines Manual § 2B5.3. It is covered in Chapter VIII of this Manual. Historically, one of the most difficult issues in sentencing § 2320 offenses concerned how to compute the infringement amount of goods in the defendant’s possession to which he had not yet applied a counterfeit mark. In cases where the defendant had not completed applying the counterfeit mark to the goods at issue (such as in cases of attempt or aiding-and-abetting where the defendants produced counterfeit labels or packaging), courts held that the government was required to establish with a “reasonable certainty” that the defendant intended to complete and traffic in those goods. United States v. Guerra, 293 F.3d 1279, 1293-94 (11th Cir. 2002) (“There is no support for the proposition that the number of ‘infringing items’ may be based on the number of seized articles that have the mere potential of ultimately forming a component of a finished counterfeit article, without a determination as to the extent to which defendants had a reasonable likelihood of actually completing the goods.”); United States v. Sung, 51 F.3d 92, 94-96 (7th Cir. 1995) (remanding for resentencing because the district court did not find with reasonable certainty that Sung intended to sell 240,000 counterfeit shampoo bottles where the only evidence of intent was the possession of counterfeit trademarked shipping cartons that could hold 240,000 bottles, and defendant had liquid to fill only 17,600 bottles). Further, if the counterfeit label was not attached to the good, the counterfeit item’s value might have been determined by whether the counterfeit label itself has a market value separate from the value of the infringing item for which it was III.Trafficking In Counterfeit Marks 149 intended. Compare United States v. Bao, 189 F.3d 860, 866-67 (9th Cir. 1999) (holding that the most appropriate retail value to use in sentencing under 18 U.S.C. § 2318 for trafficking in counterfeit computer software manuals was that of the genuine computer manual, not the total software package) with Guerra, 293 F.3d at 1292 (distinguishing Bao in § 2320 conviction because the cigar labels had no retail value apart from being attached to the cigars). In response to the 2006 amendments, which expressly addressed counterfeit labeling components, the Sentencing Commission amended the Application Notes to § 2B5.3 to provide that the retail value of the infringed item should be used to determine the infringement amount when the case involves: a counterfeit label, patch, sticker, wrapper, badge, emblem, medallion, charm, box, container, can, case, hangtag, documentation, or packaging of any type or nature (I) that has not been affixed to, or does not enclose or accompany a good or service; and (II) which, had it been so used, would appear to a reasonably informed purchaser to be affixed to, enclosing, or accompanying an identifiable, genuine good or service. In such a case, the “infringed item” is the identifiable, genuine good or service. United States Sentencing Guidelines § 2B5.3 cmt. n.2(A)(vii) (2012) (as amended by Amendment 682, effective September 12, 2006). On April 10, 2013, the Sentencing Commission promulgated new Guidelines amendments to address the counterfeit military good or service offense in § 2320(a)(3) that was created by the NDAA for FY2012 (enacted Dec. 31, 2011), and the counterfeit drug offense in § 2320(a)(4) that was created by the FDASIA (enacted July 9, 2012). Under these amendments, both types of offenses will generally be subject to a 2-level enhancement, and counterfeit military goods offenses will also be subject to a minimum offense level of 14. Application of these new Guidelines provisions is discussed further in Chapter VIII of this Manual. 150 Prosecuting Intellectual Property Crimes F. Other Charges to Consider When confronted with a case that implicates counterfeit trademarks, service marks, or certification marks, prosecutors may consider the following crimes in addition to or in lieu of § 2320 charges if § 2320’s elements cannot be met: • Conspiracy and aiding-and-abetting, 18 U.S.C. §§ 2, 371 Consider these charges if the defendant only supplied counterfeit labels or packaging that were attached by another person. See Section B.3.c. of this Chapter. • Mail and wire fraud, 18 U.S.C. §§ 1341, 1343 These charges can be filed if the defendant used the mail (or other interstate carrier) or wires (including the Internet) in a scheme to defraud purchasers, whether direct or indirect purchasers. Mail and wire fraud may be especially appropriate when there are foreign victims and domestic jurisdiction under § 2320 is difficult to establish. See Pasquantino v. United States, 544 U.S. 349, 125 S. Ct. 1766 (2005) (affirming wire fraud conviction where victim was the Canadian government); United States v. Trapilo, 130 F.3d 547, 552 (2d Cir. 1997) (“The [wire fraud] statute reaches any scheme to defraud involving money or property, whether the scheme seeks to undermine a sovereign’s right to impose taxes, or involves foreign victims and governments.”) (emphasis in original) (citations omitted). Mail and wire fraud charges may be available if the defendant told his direct purchasers that his goods were counterfeit, so long as he and his direct purchasers intended to defraud the direct purchasers’ customers. If, however, all the participants intended that the goods be sold to the ultimate customers as admitted “replicas,” then mail and wire fraud charges will likely be unavailable. • Copyright infringement, 17 U.S.C. § 506, 18 U.S.C. § 2319 Consider these charges if the underlying goods are not only trademarked or service marked, but also contain copyrighted III.Trafficking In Counterfeit Marks 151 contents, such as books, movies, music, or software. See Chapter II of this Manual. • Trafficking in counterfeit labels, illicit labels, or counterfeit documentation or packaging, 18 U.S.C. § 2318 Consider charging § 2318 if the labels, documentation, or packaging were intended to be used with copyrighted works. See Chapter VI of this Manual. • Trafficking in misbranded food, drugs and cosmetics See Food, Drug, and Cosmetic Act and Title 21 provisions, including 21 U.S.C. §§ 331(a) (prohibitions on misbranding), 333 (criminal penalties), 343 (misbranded food), 352 (misbranded drugs and devices), 362 (misbranded cosmetics) and 841(a)(2) (prohibiting distribution of counterfeit controlled substances). • Tampering with consumer products, 18 U.S.C. § 1365 Tampering with labels and communicating false information that a consumer product has been tainted. • Trafficking in mislabeled wool, fur and textile fiber products Title 15 U.S.C. §§ 68a, 68h (prohibiting commercial dealing in misbranded wool products), 69a, 69i (prohibiting commercial dealing in misbranded fur products), 70a, 70i (prohibiting commercial dealing in misbranded textile fiber products). • Racketeer Influenced and Corrupt Organizations (RICO), 18 U.S.C. §§ 1961-1968 Consider RICO if the intellectual property crimes are committed by organizations. Counterfeit labeling, 18 U.S.C. § 2318; criminal copyright infringement, 18 U.S.C. § 2319; trafficking in recordings of live musical performances, 18 U.S.C. § 2319A; and trademark counterfeiting, 18 U.S.C. § 2320, are all predicate offenses for a racketeering charge under 18 U.S.C. § 1961(1)(B). A RICO charge requires prior approval from the Organized Crime and Gang Section of the Criminal Division (OCGS). See United States Attorneys’ Manual 152 Prosecuting Intellectual Property Crimes (USAM) 9-110.101, 9-110.320. To contact OCGS, call (202) 514-3594. • Money laundering, 18 U.S.C. §§ 1956, 1957 Section 2320 is a predicate offense for a money laundering charge. 18 U.S.C. § 1956(c)(7)(D). See, e.g., United States v. Bohai Trading Co., 45 F.3d 577, 579 (1st Cir. 1995) (charging § 2320 and § 1957 offenses). Those seeking additional information on enforcing criminal provisions of the Food, Drug, and Cosmetic Act designed to protect consumers should contact the Justice Department’s Consumer Protection Branch at (202) 6160295. Congress has also provided civil remedies for violations of its prohibitions on misbranded goods and has established agencies to enforce those laws, such as the Federal Trade Commission and the Food and Drug Administration. Cases appropriate for civil enforcement may be referred to the appropriate agency. The Federal Trade Commission’s Marketing Practices Division, which is part of the Consumer Protection Bureau, may be reached at (202) 3262412. The Federal Trade Commission’s website is www.ftc.gov, and their general information telephone number is (202) 326-2222. The Food and Drug Administration’s website is www.fda.gov, and they may be reached by telephone at 1-888-INFO-FDA (1-888-463-6332). III.Trafficking In Counterfeit Marks 153 154 Prosecuting Intellectual Property Crimes IV. Theft of Commercial Trade Secrets— 18 U.S.C. §§ 1831-1839 A. Introduction “A trade secret is really just a piece of information (such as a customer list, or a method of production, or a secret formula for a soft drink) that the holder tries to keep secret by executing confidentiality agreements with employees and others and by hiding the information from outsiders by means of fences, safes, encryption, and other means of concealment, so that the only way the secret can be unmasked is by a breach of contract or a tort.” ConFold Pac., Inc. v. Polaris Indus., 433 F.3d 952, 959 (7th Cir. 2006) (Posner, J.) (citations omitted). Or, as Judge Posner could have pointed out, it can also be unmasked by a criminal act. Congress expressly criminalized the theft of trade secrets with passage of the Economic Espionage Act of 1996, Pub. L. No. 104-294, 110 Stat. 3489 (1996) (codified at 18 U.S.C. §§ 1831-1839) (EEA). Prior to the EEA, criminal liability for the theft of trade secrets was available indirectly in limited situations: 18 U.S.C. § 1905 for the unauthorized disclosure of government information, including trade secrets, by a government employee; 18 U.S.C. § 2314 for the interstate transportation of stolen property, including trade secrets; and 18 U.S.C. §§ 1341, 1343, and 1346 for the use of mail or wire communications in a fraud scheme to obtain confidential business information in. See Section G. of this Chapter. And while some state laws provided for criminal enforcement of trade secret theft, the legal landscape was far from uniform. Congress passed the EEA in 1996 “against a backdrop of increasing threats to corporate security and a rising tide of international and domestic economic espionage.” United States v. Hsu, 155 F.3d 189, 194 (3d Cir. 1998). Congress further recognized that as America continued to transition to a technology and information-based economy, its businesses’ confidential information would 155 become increasingly tied to America’s national security. See H.R. Rep. No. 104788, at 4-7 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4023-26; see also id. at 7 (1996) (noting “the importance of developing a systematic approach to the problem of economic espionage”). Thus, the EEA was intended to bring the legal framework prohibiting the theft of sensitive and proprietary business information in line with the realities of the information age. See 142 Cong. Rec. 27111-12 (1996) (Statement of Senator Specter). The statute closed a gap in federal law that made it difficult to prosecute the theft of trade secrets. Hsu, 155 F.3d at 194-95; see also United States v. Yang, 281 F.3d 534, 543 (6th Cir. 2002) (noting “the purpose of the EEA was to provide a comprehensive tool for law enforcement personnel to use to fight theft of trade secrets”). In recent years, the number of EEA cases has dramatically increased. See, e.g., U.S. Intellectual Property Enforcement Coordinator, 2011 Annual Report on Intellectual Property Enforcement, at 30-31 (2012); U.S. Dep’t of Justice, PRO IP Act Annual Report FY2011, at 18-19 (2011); FBI, PRO IP Act Annual Report FY2011, at 1 (2011); U.S. Dep’t of Justice, PRO IP Act Annual Report FY2010, at 16-18 (2010); FBI, PRO IP Act Annual Report FY2010, at 1 (2010). The EEA has undergone two recent amendments. The Theft of Trade Secrets Clarification Act, Pub. L. No. 112-236, § 2, 126 Stat. 1627 (2012) (“2012 amendment” ), enacted December 28, 2012, clarified the “interstate commerce” element of 18 U.S.C. § 1832 in response to the Second Circuit’s decision in United States v. Aleynikov, 676 F.3d 71 (2d Cir. 2012). The Foreign and Economic Espionage Penalty Enhancement Act, Pub. L. No. 112-269, § 3, 126 Stat. 2442 (2013), enacted January 14, 2013, increased the fines available for 18 U.S.C. § 1831 offenses, and directed the United States Sentencing Commission to review the penalties applicable to EEA offenses. This Chapter considers a number of issues arising under the Economic Espionage Act in depth. A sample indictment and jury instructions appear at Appendix D. In addition to this Chapter, prosecutors may wish to consult the following treatises or law review articles: Uniform Trade Secrets Act § 1 et seq. (amended 1985), 14 U.L.A. 438 (1990); Roger M. Milgrim, Milgrim on Trade Secrets (2012); Ronald D. Coenen Jr. et al., Intellectual Property Crimes, 48 Am. Crim. L. Rev. 849 (2011); 6 Joel Androphy, White Collar Crime, § 45:1-18 (2012); Economic Espionage and Trade Secrets, 57 United States Attorneys’ Bulletin, No. 5, 1-69 (Nov. 2009) (series of articles on prosecuting EEA cases), available at http://www.justice.gov/usao/eousa/foia_reading_room/usab5705. pdf; J. Michael Chamblee, Validity, Construction, and Application of Title I of 156 Prosecuting Intellectual Property Crimes Economic Espionage Act of 1996 (18 U.S.C.A. §§ 1831 et seq.), 177 A.L.R. Fed. 609 (2002); James M. Fischer, Note, An Analysis of the Economic Espionage Act of 1996, 25 Seton Hall Legis. J. 239 (2001); Louis A. Karasik, Under the Economic Espionage Act: Combating Economic Espionage is No Longer Limited to Civil Actions to Protect Trade Secrets, 48 Fed. Law. 34 (2001); Michael Coblenz, Intellectual Property Crimes, 9 Alb. L.J. Sci. & Tech. 235 (1999); James H.A. Pooley, Mark A. Lemley & Peter J. Toren, Understanding the Economic Espionage Act of 1996, 5 Tex. Intell. Prop. L.J. 177 (1997). B. The Economic Espionage Act of 1996, 18 U.S.C. §§ 1831-1839 1. Overview The Economic Espionage Act of 1996 (“EEA”) promotes two primary and related objectives: to protect national and economic security. As noted in the House Report: With this legislation, Congress will extend vital federal protection to another form of proprietary economic information—trade secrets. There can be no question that the development of proprietary economic information is an integral part of America’s economic well-being. Moreover, the nation’s economic interests are a part of its national security interests. Thus, threats to the nation’s economic interest are threats to the nation’s vital security interests. H.R. Rep. No. 104-788, at 4 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4023. President Clinton echoed these twin objectives in signing the legislation into law: Trade secrets are an integral part of virtually every sector of our economy and are essential to maintaining the health and competitiveness of critical industries operating in the United States. Economic espionage and trade secret theft threaten our Nation’s national security and economic well-being. Until today, Federal law has not accorded appropriate or adequate protection to trade secrets, making it difficult to prosecute thefts involving this type of information. Law IV.Theft of Commercial Trade Secrets 157 enforcement officials relied instead on antiquated laws that have not kept pace with the technological advances of modern society. This Act establishes a comprehensive and systemic approach to trade secret theft and economic espionage, facilitating investigations and prosecutions. President William J. Clinton, Presidential Statement on the Signing of the Economic Espionage Act of 1996 (Oct. 11, 1996), available at 1996 Pub. Papers 1814 (Oct. 11, 1996). The EEA criminalizes two types of trade secret misappropriation: economic espionage, under § 1831, and trade secret theft, under § 1832. In Title 18, § 1831 punishes the theft of a trade secret to benefit a foreign government, instrumentality, or agent: (a) In general.—Whoever, intending or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent, knowingly— (1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains a trade secret; (2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys a trade secret; (3) receives, buys, or possesses a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; (4) attempts to commit any offense described in any of paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any offense described in any of paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy, shall, except as provided in subsection (b), be fined not more than $5,000,000 or imprisoned not more than 15 years, or both. 158 Prosecuting Intellectual Property Crimes 18 U.S.C. § 1831(a) (as amended by the Foreign and Economic Espionage Penalty Enhancement Act, Pub. L. No. 112-269, § 3, 126 Stat. 2442 (2013)) (emphasis added). Section 1832, in contrast, punishes the commercial theft of trade secrets carried out for economic advantage, whether or not it benefits a foreign government, instrumentality, or agent: (a) Whoever, with intent to convert a trade secret, that is related to a product or service used or intended for use in interstate or foreign commerce, to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will injure any owner of that trade secret, knowingly— (1) steals, or without authorization appropriates, takes, carries away, or conceals, or by fraud, artifice, or deception obtains such information; (2) without authorization copies, duplicates, sketches, draws, photographs, downloads, uploads, alters, destroys, photocopies, replicates, transmits, delivers, sends, mails, communicates, or conveys such information; (3) receives, buys, or possesses such information, knowing the same to have been stolen or appropriated, obtained, or converted without authorization; (4) attempts to commit any offense described in paragraphs (1) through (3); or (5) conspires with one or more other persons to commit any offense described in paragraphs (1) through (3), and one or more of such persons do any act to effect the object of the conspiracy, shall, except as provided in subsection (b), be fined under this title or imprisoned not more than 10 years, or both. 18 U.S.C. § 1832(a) (as amended by the Theft of Trade Secrets Clarification Act, Pub. L. No. 112-236, § 2, 126 Stat. 1627 (2012)) (emphasis added). Although § 1831 (foreign economic espionage) and § 1832 (theft of trade secrets) define separate offenses, they are nevertheless related. The following IV.Theft of Commercial Trade Secrets 159 table highlights the common and distinct statutory language for both offenses, which are further discussed below: (1) (2) (3) (4) (5) (6) Section 1831(a) (Economic Espionage) The defendant knowingly misappropriated information (e.g., possessed, stole, transmitted, downloaded) (or conspired or attempted to do so) The defendant knew or believed this information was proprietary and that he had no claim to it The information was in fact a trade secret (unless conspiracy or an attempt is charged) The defendant knew or intended that the offense would benefit a foreign government, foreign instrumentality, or foreign agent Section 1832(a) (Theft of Trade Secrets) Same Same Same The defendant intended to convert the trade secret to the economic benefit of anyone other than the owner The defendant knew or intended that the offense would injure the owner of the trade secret The trade secret was related to a product or service used or intended for use in interstate or foreign commerce Sections 1831(a) and 1832(a) both require the government to prove beyond a reasonable doubt that: (1) the defendant misappropriated information (or conspired or attempted to do so); (2) the defendant knew or believed this information was proprietary and that he had no claim to it; and (3) the information was in fact a trade secret (unless, as is discussed below, the crime charged is a conspiracy or an attempt). See 18 U.S.C. §§ 1831(a), 1832(a). Both sections criminalize trade secret misappropriations in a variety of forms, including but not limited to: • stealing, taking or using fraud, artifice, or deception to obtain the trade secret, under §§ 1831(a)(1), 1832(a)(1); 160 Prosecuting Intellectual Property Crimes • • duplicating, taking photographs, downloading, uploading, altering, destroying, transmitting, or conveying the trade secret, under §§ 1831(a)(2), 1832(a)(2); receiving, buying or possessing the trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization, under §§ 1831(a)(3), 1832(a)(3). To prove economic espionage under 18 U.S.C. § 1831, the government must also prove the defendant knew or intended that the offense would benefit a foreign government, foreign instrumentality, or foreign agent. If a foreign instrumentality element does not exist or cannot be proved, the government may still establish a violation of 18 U.S.C. § 1832 by proving, in addition to the first three elements described above, that: (4) the defendant intended to convert the trade secret to the economic benefit of anyone other than the owner; (5) the defendant knew or intended that the offense would injure the owner of the trade secret; and (6) the trade secret was related to a product or service used or intended for use in interstate or foreign commerce. The EEA can be applied to a wide variety of criminal conduct. The statute criminalizes attempts and conspiracies to violate the EEA and certain extraterritorial conduct. See Sections B.6. and E.4. of this Chapter. The EEA also provides several remedies that are unusual in a criminal statute: civil injunctive relief against violations, to be obtained by the Attorney General, 18 U.S.C. § 1836, and confidentiality orders to maintain the trade secret’s secrecy throughout the prosecution, 18 U.S.C. § 1835. See Section D. of this Chapter. The statute includes an extraterritoriality provision, 18 U.S.C. § 1837, which extends its reach to conduct outside the United States where certain conditions are met. See Section E.4. of this Chapter. For a discussion of the Department of Justice’s oversight of and necessary approvals for EEA prosecutions, see Sections B.4, E.5. 2. Relevance of Civil Cases The EEA’s definition of a trade secret, 18 U.S.C. § 1839(3), is based in part on the trade secret definition in the Uniform Trade Secrets Act (UTSA), 14 U.L.A. 438 (1990). See H. R. Rep. No. 104-788, at 12 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4031. Cases that address trade secrets outside the EEA should, in most cases, be relevant in EEA prosecutions. See generally United States v. Chung, 659 F.3d 815 (9th Cir. 2011), cert. denied, _ U.S. _ IV.Theft of Commercial Trade Secrets 161 (2012) (Because the EEA trade secret definition “is derived from the definition that appears in the Uniform Trade Secrets Act ... we consider instructive interpretations of state laws that adopted the UTSA definition without substantial modification”) (footnote omitted); Hsu, 155 F.3d at 196 (“The EEA’s definition of a ‘trade secret’ is similar to that found in a number of state civil statutes and the Uniform Trade Secrets Act (‘UTSA’), a model ordinance which permits civil actions for the misappropriation of trade secrets. There are, though, several critical differences which serve to broaden the EEA’s scope.”) (footnote omitted). 3. Elements Common to 18 U.S.C. §§ 1831, 1832 As discussed below, a trade secret consists of three primary components: (1) information; (2) which derives independent economic value from being secret; and (3) that the owner took reasonable measures to protect. See also ConFold Pac., Inc. v. Polaris Indus., 433 F.3d 952, 959 (7th Cir. 2006) (Posner, J.) (noting a trade secret can be any information, whether in tangible form or otherwise, that its owner takes reasonable measures to keep secret, and that has some economic value as a result of its secrecy) (citations omitted). The elements for completed offenses are discussed in the ensuing sections. Attempts and conspiracies are discussed in Section B.6. of this Chapter. a. The Information Was a Trade Secret The government should ascertain the specific information the victim claims is a trade secret at the outset of the investigation. “[A] prosecution under [the EEA] must establish a particular piece of information that a person has stolen or misappropriated.” 142 Cong. Rec. 27, 117 (1996). This will help avoid the defendant’s defense that he was merely relying on his general knowledge, skills, and abilities along, perhaps, with legitimate reverse engineering. See Section C.3. of this Chapter. Other questions to consider include how many trade secrets may have been misappropriated and how they relate to one another. In ascertaining what is the trade secret and the number of trade secrets in a particular case, consider who would be the best trial witness to testify about these issues before the jury. For example, where source code is the trade secret, the chief technology officer, or other supervisor overseeing the project development, may be an appropriate witness. In other cases, a chief engineer may be a suitable witness, depending on the nature of the trade secret. 162 Prosecuting Intellectual Property Crimes The defense, however, has no right to take pre-trial depositions of the government’s expert witnesses to determine what the government will claim is a trade secret and why. See United States v. Ye, 436 F.3d 1117, 1123 (9th Cir. 2006) (granting government’s petition for a writ of mandamus and rescinding trial court order for deposition of the government’s expert witnesses). i. “Information” Whether particular information is a trade secret is a question of fact. See, e.g., Hoechst Diafoil Co. v. Nan Ya Plastics Corp., 174 F.3d 411, 419 (4th Cir. 1999) (noting that whether or not a trade secret exists is a “fact-intensive question to be resolved upon trial”); see also 4 Roger M. Milgrim, Milgrim on Trade Secrets § 15.01[1][a][i]. The EEA defines a trade secret very broadly to include all types of information, regardless of the method of storage or maintenance, that the owner has taken reasonable measures to keep secret and that itself has independent economic value. Specifically, §1839(3) states: (3) the term “trade secret” means all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing if — (A) the owner thereof has taken reasonable measures to keep such information secret; and (B) the information derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, the public. 18 U.S.C. § 1839(3). The statute’s legislative history also counsels a broad interpretation of this definition. See H.R. Rep. No. 104-788, at 12 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4031. In addition, because the EEA’s definition of a trade secret derives in part from civil law, civil cases that address trade secrets outside the EEA should, in most cases, be helpful in EEA prosecutions. See Section B.2. of this Chapter. IV.Theft of Commercial Trade Secrets 163 Examples of trade secrets in criminal prosecutions include: • Processes, methods, and formulas for an anti-cancer drug known as Taxol. United States v. Hsu, 155 F.3d 189 (3rd Cir. 1998) • Cost information unavailable to the public, confidential business plan, and customer list. United States v. Martin, 228 F.3d 1 (1st Cir. 2000) • Measurements, metallurgical specifications, and engineering drawings to produce an aircraft brake assembly. United States v. Lange, 312 F.3d 263 (7th Cir. 2002) • Adhesive product information. United States v. Yang, 281 F.3d 534 (6th Cir. 2002) • Microsoft windows source code. United States v. Genovese, 409 F. Supp. 2d 253 (S.D.N.Y. 2005) • Coca–Cola documents and product samples. United States v. Williams, 526 F.3d 1312 (11th Cir. 2008) (per curiam) • Biological strains and plasmids. United States v. Huang, Nos. 1:10-cr102, 1:11-cr-163 (S.D. Ind. 2010) • Documents relating to the Space Shuttle, Delta IV and C-17. United States v. Chung, 633 F. Supp. 2d 1134 (C.D. Cal. 2009), aff’d, 659 F.3d 815 (9th Cir. 2011), cert. denied, _ U.S. _ (2012) • Photographs of tire-assembly machine. United States v. Howley, __F.3d__, 2013 WL 399345, at *3 (6th Cir. Feb. 4, 2013). For an extensive collection of cases analyzing whether specific types of information constitute a trade secret, see 1 Milgrim on Trade Secrets § 1.09. In cases alleging attempt and conspiracy, the government need not prove that the information actually was a trade secret. See Section B.6. of this Chapter. ii. Secrecy The key attribute of a trade secret is that the underlying information “not be[] generally known to ... the public” and that it “not be[] readily ascertainable through proper means by [] the public.” 18 U.S.C. § 1839(3)(B). Unlike other forms of intellectual property, a trade secret need only possess “minimal novelty.” Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 476 (1974) (quoting Comment, The Stiffel Doctrine and the Law of Trade Secrets, 62 Nw. U. L. Rev. 956, 969 (1968)); see also Avidair Helicopter Supply, Inc. v. RollsRoyce Corp., 663 F.3d 966, 972 (8th Cir. 2011) (finding “existence of a trade secret is determined by the value of a secret, not the merit of its technical improvements”); Learning Curve Toys, Inc. v. Playwood Toys, Inc., 342 F.3d 714, 164 Prosecuting Intellectual Property Crimes 724 (7th Cir. 2003) (finding that, in contrast to “a patentable invention, a trade secret need not be novel or unobvious.”); Avtec Sys., Inc. v. Peiffer, 21 F.3d 568, 575 (4th Cir. 1994) (holding that the “hallmark of a trade secret is not its novelty but its secrecy”); Arco Indus. Corp. v. Chemcast Corp., 633 F.2d 435, 442 (6th Cir. 1980) (trade secret need only minimal novelty). This has been defined as some element that sets the information apart from what is generally known. “While we do not strictly impose a novelty or inventiveness requirement in order for material to be considered a trade secret, looking at the novelty or uniqueness of a piece of information or knowledge should inform courts in determining whether something is a matter of general knowledge, skill or experience.” 142 Cong. Rec. 27, 117 (1996); see also Hertz v. Luzenac Grp., 576 F.3d 1103, 1110 (10th Cir. 2009) (observing that “[a] finding that some of the elements are secret may support a conclusion that the entire process is protected”); cf. Buffets, Inc. v. Klinke, 73 F.3d 965, 968 (9th Cir. 1996) (holding that plaintiff’s recipes were not trade secrets in part because they lacked the requisite novelty). Whether the term “public” in 18 U.S.C. § 1839(3)(B) refers to the general public or those with general skills in a particular trade or industry has been the subject of litigation. “[E]ither the phrase ‘readily ascertainable’ or the phrase ‘the public’ must be understood to concentrate attention on either potential users of the information, or proxies for them (which is to say, persons who have the same ability to ‘ascertain’ the information).” United States v. Lange, 312 F.3d 263, 268 (7th Cir. 2002) (Easterbrook, J.). But see id. at 271-72 (Ripple, J., concurring) (suggesting that this holding is dictum); see also Chung, 659 F.3d at 825 (noting open issue and “some conflict between circuits” on this issue). In other words, information will not necessarily be a trade secret just because it is not readily ascertainable by the general public. Under the Seventh Circuit’s view, the information may not be a trade secret if it is readily ascertainable by those within the information’s field of specialty. If a scientist could ascertain a purported trade secret formula only by gleaning information from publications and then engaging in many hours of laboratory testing and analysis, the existence of such publications would not necessarily disqualify the formula as a trade secret under the EEA, since the scientist’s work may probably not qualify as “readily ascertainable through proper means by, the public.” See 18 U.S.C. § 1839(3)(B). But the formula would not be a trade secret if it could be ascertained or reverse engineered within a relatively short time or through the expenditure of few resources. IV.Theft of Commercial Trade Secrets 165 See Lange, 312 F.3d at 269 (EEA case) (“Such measurements could not be called trade secrets if ... the assemblies in question were easy to take apart and measure.”); Buffets, Inc. v. Klinke, 73 F.3d 965, 968 (9th Cir. 1996) (holding restaurant chain’s recipes were not trade secrets because, although innovative, the recipes were readily ascertainable by others); Marshall v. Gipson Steel, Inc., 806 So.2d 266, 271-72 (Miss. 2002) (holding that company’s bid estimating system was readily ascertainable by using simple math applied to data on past bids, and thus was not a trade secret); Weins v. Sporleder, 569 N.W.2d 16, 2021 (S.D. 1997) (holding formula of cattle feed product was not a trade secret because the ingredients could be determined through chemical or microscopic analysis in four or five days, at most, and for about $27). iii. Elements in the Public Domain A trade secret can include elements that are in the public domain if the trade secret itself constitutes a unique, “effective, successful and valuable integration of the public domain elements.” Rivendell Forest Prods., Ltd. v. Georgia-Pacific Corp., 28 F.3d 1042, 1046 (10th Cir. 1994); accord Tewari DeOx Sys., Inc. v. Mountain States/Rosen, L.L.C., 637 F.3d 604, 613 (5th Cir. 2011); Strategic Directions Grp., Inc. v. Bristol-Myers Squibb Co., 293 F.3d 1062, 1065 (8th Cir. 2002); Metallurgical Indus., Inc. v. Fourtek, Inc., 790 F.2d 1195, 1202 (5th Cir. 1986); Servo Corp. of America v. General Electric Co., 393 F.2d 551, 554 (4th Cir.1968) (holding that a trade secret “might consist of several discrete elements, any one of which could have been discovered by study of material available to the public”); Apollo Techs. Corp. v. Centrosphere Indus., 805 F. Supp. 1157, 1197 (D.N.J. 1992). In fact, “[a] trade secret can exist in a combination of characteristics and components, each of which, by itself, is in the public domain, but the unified process, design and operation of which, in unique combination, affords a competitive advantage and is a protectable secret.” Metallurgical Indus., 790 F.2d at 1202 (quoting Imperial Chem., Ltd. v. National Distillers & Chem. Corp., 342 F.2d 737, 742 (2d Cir. 1965)); accord Hertz v. Luzenac Grp., 576 F.3d 1103, 1109-10 (10th Cir. 2009); Mike’s Train House, Inc. v. Lionel, L.L.C., 472 F.3d 398, 411 (6th Cir. 2006); Harvey Barnett, Inc. v. Shidler, 338 F.3d 1125,1130 (10th Cir. 2003); 3M v. Pribyl, 259 F.3d 587, 595-96 (7th Cir. 2001); Integrated Cash Mgmt. Servs., Inc. v. Digital Transactions, Inc., 920 F.2d 171, 174 (2d Cir. 1990); Syntex Ophthalmics, Inc. v. Tsuetaki, 701 F.2d 677, 684 (7th Cir. 1983); Rivendell Forest Prods., 28 F.3d at 1046. For example, in Metallurgical Industries, when the company modified a generally-known zinc recovery process, the modified 166 Prosecuting Intellectual Property Crimes process could be considered a trade secret even though the original process and the technologies involved were publicly known, because the details of the modifications were not. 790 F.2d at 1201-03. The definition of a trade secret under 18 U.S.C. § 1839(3) includes “compilations.” The courts have consistently recognized that a compilation which includes publicly known elements may still qualify as a trade secret so long as the unified information satisfies the requirements to establish a trade secret. See, e.g., AvidAir Helicopter Supply, Inc. v. Rolls-Royce Corp., 663 F.3d 966, 972 (8th Cir. 2011) (“Compilations of non-secret and secret information can be valuable so long as the combination affords a competitive advantage and is not readily ascertainable.”); Decision Insights, Inc. v. Sentia Group, Inc., 311 Fed. Appx. 586, at 592-94 (4th Cir. 2009) (per curiam) (noting that a software compilation can qualify for protection as a trade secret); 3M v. Pribyl, 259 F.3d 587, 586 (7th Cir. 2001) (trade secret established for operating procedures and manuals which included material in the public domain, concluding that “when all the cleaning procedures, temperature settings, safety protocols, and equipment calibrations are collected and set out as a unified process, that compilation, if it meets the other qualifications, may be considered a trade secret”); Imperial Chem. Indus. v. Nat’l Distillers and Chem. Corp., 342 F.2d 737, 740 (2d Cir. 1965) (while eight of the nine components for a chemical process were in the public domain, the “unified description of the design, process and operation, i.e, the way in which the features were interrelated” constituted a trade secret); see also Penalty Kick Mgmt. Ltd. v. Coca Cola Co., 318 F.3d 1284, 1291 (11th Cir. 2003) (“even if all of the information is publicly available, a unique combination of that information, which adds value to the information, also may qualify as a trade secret”). iv. Independent Economic Value The trade secret must derive “independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable by, the public.” 18 U.S.C. § 1839(3)(B). Although the EEA does not require the government to prove a specific level of value, the government must prove that the secret has some value. Economic value “speaks to the value of the information to either the owner or a competitor; any information which protects the owner’s competitive edge or advantage.” US West Communications, Inc. v. Office of Consumer Advocate, 498 N.W.2d 711, 714 (Iowa 1993) (citations omitted). “[I]nformation kept secret that would be useful to a competitor and require cost, time and effort to duplicate is of economic value.” Id. (citation IV.Theft of Commercial Trade Secrets 167 omitted); see also Trandes Corp. v. Guy F. Atkinson Co., 996 F.2d 655, 663 (4th Cir. 1993) (object code derived independent economic value from secrecy where the trade secret owner “generates most of its revenues by providing computer services to engineering firms and construction companies” and “receives raw data from its clients, processes the data with the Tunnel System software, and reports the results back to the clients”; “[a]rmed with a copy of the object code, an individual would have the means to offer much the same engineering services as” the trade secret owner). Independent economic value can be shown even where there are no direct competitors for the particular trade secret but disclosure would confer advantages to competitors. See, e.g., Chung, 659 F.3d at 827 (“Although Boeing had no competitors for the integration project itself, ... [a] reasonable inference is that the information could assist a competitor in understanding how Boeing approaches problem-solving and in figuring out how best to bid on a similar project in the future, for example, by underbidding Boeing on tasks at which Boeing appears least efficient.”). The secret’s economic value can be demonstrated by the circumstances of the offense, such as the defendant’s acknowledgment that the secret is valuable, the defendant’s asking price, or an amount of time or money the defendant’s buyers would have required to replicate the information. See United States v. Lange, 312 F.3d 263, 269 (7th Cir. 2002); United States v. Genovese, 409 F. Supp. 2d 253, 257 (S.D.N.Y. 2005). Not all of a business’s confidential information may be valuable in a competitor’s hands. For example, in Microstrategy, Inc. v. Business Objects, S.A., 331 F. Supp. 2d 396, 421 (E.D. Va. 2004), the court found that a companywide email concerning the firm’s financial problems and plans for survival was not a trade secret because it was unclear what economic value it would have had to anyone outside the company. See also US West Communications, 498 N.W.2d at 715 (finding no evidence of economic value without evidence that disclosure would have harmed the victim). Customer Lists or Information Some information that a company deems proprietary may not qualify as a trade secret. For example, under the Uniform Trade Secrets Act—which defines trade secrets in a manner similar to the EEA—a customer list is generally a trade secret only if the customers are not known to others in the industry, could be discovered only by extraordinary efforts, and the list was developed through a substantial expenditure of time and money. See ATC Distribution Group v. 168 Prosecuting Intellectual Property Crimes Whatever It Takes Transmissions & Parts, 402 F.3d 700, 714-15 (6th Cir. 2005); Conseco Fin. Servicing Corp. v. North Am. Mortgage Co., 381 F.3d 811, 819 & n.6 (8th Cir. 2004) (holding files of thousands of customers nationwide who were identified through a complex computer system to be trade secrets); United States v. Martin, 228 F.3d 1, 12 n.8 (1st Cir. 2000) (noting customer list could qualify as a trade secret); A.F.A. Tours, Inc. v. Whitchurch, 937 F.2d 82, 89 (2d Cir. 1991) (customer list from tour agency could qualify as a trade secret); Surgidev Corp. v. Eye Technology, Inc., 828 F.2d 452, 455 & n.3 (8th Cir. 1987) (ophthalmologist customer information on high volume implanters of surgically implanted intraocular lenses devices qualified as a trade secret); Leo Silfen, Inc. v. Cream, 278 N.E.2d 636, 639-41 (N.Y. 1972). Some state statutes, based on Section 1(4) of the Uniform Trade Secret Act, expressly include customer lists within the definition of a trade secret. Whether a customer list qualifies as a trade secret depends on the facts. For example, a customer list is less likely to be considered a trade secret if customers’ identities are readily ascertainable to those outside the list-owner’s business and the list was compiled merely through general marketing efforts. See ATC Distribution Group, 402 F.3d at 714-15 (affirming that customer list of transmission parts customers was not a trade secret because names of purchasers could “be ascertained simply by calling each shop and asking”); Nalco Chem. Co. v. Hydro Techs., Inc., 984 F.2d 801, 804 (7th Cir. 1993) (holding that customer list was not a trade secret when base of potential customers was “neither fixed nor small”); Standard Register Co. v. Cleaver, 30 F. Supp. 2d 1084, 1095 (N.D. Ind. 1998) (holding that customer list was not a trade secret where owner’s competitors knew customer base, knew other competitors quoting the work, and were generally familiar with the customers’ needs). v. Reasonable Measures Trade secrets are fundamentally different from other forms of property in that a trade secret’s owner must take reasonable measures under the circumstances to keep the information confidential. See 18 U.S.C. § 1839(3) (A); Lange, 312 F.3d at 266. This requirement is generally not imposed upon those who own other types of property. For example, a thief can be convicted for stealing a bicycle the victim left unlocked in a public park, whereas a thief might not be convicted under the EEA for stealing the bicycle’s design plans if the victim left the plans in a public park. IV.Theft of Commercial Trade Secrets 169 For these reasons, prosecutors and investigators should identify the measures the victim used to protect the trade secret early in their investigation. These protections will be a critical component of the case or the decision not to prosecute. One means of identifying the reasonable measures safeguarding the trade secret is to visit the facility. The barriers to access may be more readily apparent by viewing the circumstances and surroundings. Whether reasonable efforts have been employed is normally a question of fact for the fact-finder. See, e.g., Camp Creek Hospitality Inns, Inc. v. Sheraton Franchise Corp., 139 F.3d 1396, 1411 (11th Cir. 1998) (“Whether Camp Creek’s efforts to keep the information secret in this case were ‘reasonable under the circumstances’ presents a question for the trier of fact.”); Rockwell Graphic Sys., Inc. v. DEV Indus., Inc., 925 F.2d 174, 197 (7th Cir. 1991) (“But only in an extreme case can what is a ‘reasonable’ precaution be determined on a motion for summary judgment, because the answer depends on a balancing of costs and benefits that will vary from case to case and so require estimation and measurement by persons knowledgeable in the particular field of endeavor involved.”). Depending on the trade secret being protected, security measures may include physical safeguards, network security, and contractual protections. These measures may include: Physical Security • Restricting employee access to building areas, based on a need to know; • Requiring identification and access badges intended to limit access to restricted areas; • Keeping the secret physically secure in locked drawers, cabinets, or rooms; • Restricting visitors from accessing areas where confidential information is kept; • Requiring visitors to obtain clearance prior to visit, pass through security checkpoints and be escorted by an employee at all times; and, • Securing buildings with fences, locked doors and guards. Network Security • Encrypting sensitive electronic information, such as uncompiled source code; 170 Prosecuting Intellectual Property Crimes • • • • Protecting computer files and directories with passwords and recurring password changes; Employing corporate firewalls and virtual private networks for remote access; Restricting employees from using unapproved peripherals, such as high capacity portable storage devices; and Maintaining of network logs. Contractual and Employment Practices • Restricting access to those with a need to know; • Splitting tasks among people or teams to avoid concentrating too much information in any one place; • Requiring recipients, including employees, contractors and business partners, to sign confidentiality, non-disclosure, or noncompetition agreements; • Marking documents as confidential, proprietary, or secret;\ • Providing regular training concerning steps to safeguard trade secrets; and • Conducting exit interview once employee leaves company, and confirming confidentiality obligations with departing employee. See also Chung, 659 F.3d at 825 (“Security measures, such as locked rooms, security guards, and document destruction methods, in addition to confidentiality procedures, such as confidentiality agreements and document labeling, are often considered reasonable measures.”); Lange, 312 F.3d at 266 (EEa case concerning aircraft brake assemblies); Reingold v. Swiftships, Inc., 126 F.3d 645, 650 (5th Cir. 1997) (discussing steps to protect ship-builder’s mold for fiberglass boat hulls); 1 Roger M. Milgrim, Milgrim on Trade Secrets § 1.04. The owner’s security measures need not be absolute or the best available, and need only satisfy the standard of reasonableness under the facts and circumstances of the specific case. See H.R. Rep. No. 104-788, at 7 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4026 (“[A]n owner of this type of information need only take ‘reasonable’ measures to protect this information…. [I]t is not the Committee’s intent that the owner be required to have taken every conceivable step to protect the property from misappropriation.”); Howley, 2013 WL 399345, at *3 (“[t]he ‘reasonable measures’ requirement does not mean a company must keep its own employees and suppliers in the dark about machines they need to do their work”); Lange, 312 F.3d at 266; Surgidev Corp. v. Eye Tech., Inc., 828 F.2d 452, 455 (8th Cir. 1987) (“Only reasonable efforts, IV.Theft of Commercial Trade Secrets 171 not all conceivable efforts, are required to protect the confidentiality of putative trade secrets.”); see also Pioneer Hi-Bred Int’l v. Holden Found. Seeds, Inc., 35 F.3d 1226, 1235-36 (8th Cir. 1994) (discussing steps to safeguard genetic messages of genetically engineered corn); Gates Rubber Co. v. Bando Chem. Indus., 9 F.3d 823, 848-49 (10th Cir. 1993) (discussing steps to protect industrial belt replacement software); MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511, 521 (9th Cir. 1993) (noting reasonable measures such as requiring “employees to sign confidentiality agreements respecting [company’s] trade secrets”); K-2 Ski Co. v. Head Ski Co., 506 F.2d 471, 473-74 (9th Cir. 1974) (discussing steps to protect design and manufacture specifications of high performance skis); Elm City Cheese Co. v. Federico, 752 A.2d 1037, 1049-53 (Conn. 1999) (holding that victim’s failure to require defendant employee to sign a confidentiality, non-disclosure, or non-competition agreement was reasonable “in light of the close personal relationship enjoyed over the years” by the parties); 1 Milgrim on Trade Secrets § 1.04. A recent Ninth Circuit decision, United States v. Chung, underscores the requirement that only reasonable measures are necessary to satisfy this element. In considering a sufficiency of the evidence claim, the court considered whether reasonable measures were employed to safeguard a trade secret (phased array antenna documents for the space shuttle) which was not secured by locks. Taken as a whole, other measures were reasonable. As the court noted: Although none of the documents was kept under lock and key, Boeing implemented general physical security measures for its entire plant. Security guards required employees to show identification before entering the building, and Boeing reserved the right to search all employees’ belongings and cars. Boeing also held training sessions instructing employees not to share documents with outside parties, and it required employees, including Defendant, to sign confidentiality agreements. Further, two of the four phased array documents (underlying counts 3 and 5) were marked as proprietary. Thus, there was sufficient evidence to support the conclusion that Boeing took reasonable measures to keep all four phased array antenna documents secret. Chung, 659 F.3d at 827. 172 Prosecuting Intellectual Property Crimes It is important that the reasonable measures standard is appropriately and fairly applied. Courts have held that the focus of reasonableness should be on the measures that were taken, not on other measures that could have been taken, particularly with the benefit of hindsight. For example, the Tenth Circuit reversed a summary judgment based on misapplication of the reasonableness standard. Specifically, the trial court erred “in considering whether Luzenac adequately protected the secrecy of [trade secret] 604AV, the district court focused on the evidence of the steps that Luzenac did not take rather than the reasonableness of the measures it did take.” Hertz v. Luzenac Group, 576 F.3d 1103, 1109 (10th Cir. 2009). The court observed: “[T]here always are more security precautions that can be taken. Just because there is something else that Luzenac could have done does not mean that their efforts were unreasonable under the circumstances.” Id. at 1113; see also General Universal Sys., Inc. v. Lee, 379 F.3d 131, 150 (5th Cir. 2004) (concluding the district erroneously “focused solely on Lopez’s alleged failure to take ‘reasonable precautions’ to protect” the trade secret where there was “uncontroverted evidence that” reasonable precautions were taken). Additionally, courts have held that “the fact that one ‘could’ have obtained a trade secret lawfully is not a defense if one does not actually use proper means to acquire the information.” Pioneer Hi-Bred Int’l v. Holden Found. Seeds, Inc., 35 F.3d 1226, 1237 (4th Cir. 1994) (citations omitted); see also Wyeth v. Natural Biologics, Inc., 395 F.3d 897, 899-900 (8th Cir. 2005) (rejecting claim that the trade secret owner “failed to adequately secure its trade secret in many [specified] ways” and concluding sufficient reasonable measures included “use of physical security, limited access to confidential information, employee training, document control, and oral and written understandings of confidentiality”). If a trade secret was disclosed to licensees, vendors, or third parties for limited purposes, those disclosures do not waive trade secret protections so long as the trade secret owner took reasonable security measures before and during disclosure, such as requiring non-disclosure agreements from all recipients. See, e.g., Howley, 2013 WL 399345, at *4; Quality Measurement Co. v. IPSOS S.A., 56 Fed. Appx. 639, 647 (6th Cir. 2003); MAI Sys. Corp., 991 F.2d at 521; Religious Tech. Ctr. v. Netcom On-Line Commc’n Servs., 923 F. Supp. 1231, 1254 (N.D. Cal. 1995). However, other reasonable measures may be adopted instead. For example, where the trade secret owner “relies on deeds (the splitting of tasks) rather than promises to maintain confidentiality,” it is “irrelevant that [the victim] does not require vendors to sign confidentiality agreements.” Lange, 312 F.3d at 266 (emphasis in original). IV.Theft of Commercial Trade Secrets 173 As discussed above, information does not lose its status as a trade secret if it is disclosed to the government for purposes of investigation or prosecution. For this reason, federal prosecutors and law enforcement agents need not sign protective orders with victims before accepting trade secret information. A defendant who was unaware of the victim’s security measures can be convicted under the EEA if he was aware that the misappropriated information was proprietary. United States v. Krumrei, 258 F.3d 535, 538-39 (6th Cir. 2001) (rejecting void-for-vagueness argument against EEA); accord United States v. Genovese, 409 F. Supp. 2d 253, 258 (S.D.N.Y 2005) (“In this case, one can infer that Genovese knew not only that the source code was proprietary, but that any protective measures by Microsoft had been circumvented.”). There is no requirement that a defendant be aware that the victim implemented security measures to protect the misappropriated information. b. Misappropriation i. Means of Misappropriation Under § 1831 and § 1832, a defendant must have misappropriated the trade secret through one of the acts prohibited in §§ 1831(a)(1)-(5) or 1832(a) (1)-(5), respectively. Misappropriation covers a broad range of acts including traditional methods of theft in which a trade secret is physically removed from the owner’s possession, and also less traditional methods of misappropriation such as copying, duplicating, sketching, drawing, photographing, downloading, uploading, altering, destroying, photocopying, replicating, transmitting, delivering, sending, mailing, communicating, or conveying the information. See 18 U.S.C. §§ 1831(a)(1)-(2), 1832(a)(1)-(2). Although many of these means of misappropriation leave the original property in the hands of its owner, they reduce or destroy the trade secret’s value nonetheless. Congress prohibited all types of misappropriation “to ensure that the theft of intangible information is prohibited in the same way that the theft of physical items is punished.” H.R. Rep. No. 104-788, at 11 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4030. Misappropriation also includes the knowing receipt, purchase, or possession of trade secrets. See 18 U.S.C. §§ 1831(3), 1832(3). Because §§ 1831 and 1832 do not contain a specific statute of limitations, the general five-year statute of limitations for non-capital offenses applies. See 18 U.S.C. § 3282. In one recent prosecution for economic espionage (United States v. Chung), however, the court held misappropriation that occurred before the five-year statute of limitation does not defeat a trade secret prosecution 174 Prosecuting Intellectual Property Crimes because possession of trade secrets is a “continuing offense.” In Chung, the defendant, a former Boeing employee, misappropriated trade secrets before the five-year statute of limitations period (2003 through 2008) and included conduct that occurred during the late 1970s. The court concluded that trade secrets misappropriated before the period of the statute of limitations, yet possessed within the period of the statute of limitations may violate the statute so long as the remaining elements of the offense are satisfied. See Chung, 633 F. Supp. 2d at 1146 n.12 (“Because Mr. Chung continued to possess the documents in 2006, there is no statute of limitations problem here. [P]ossessory offenses have long been described as ‘continuing offenses’ that are not complete upon receipt of the prohibited item. Rather, the statute of limitations does not begin to run until the possessor parts with the item.”) (quotation marks and citation omitted). On appeal, the Ninth Circuit affirmed, concluding that the conspiracy to violate the EEA was established by proof that the agreement between the defendant and his co-conspirators “continued into the limitations period.” Chung, 659 F.3d at 828; see also id. (“Given Defendant’s history of passing technical documents to China, however, a rational trier of fact reasonably could infer from Defendant’s more recent possession of similar documents that his intent to benefit China persisted well into the limitations period and extended to his possession of the trade secrets.”). When charging trade secret theft or economic espionage under 18 U.S.C. §§ 1831 and 1832 the prosecutor may charge each means of theft as a separate count. For example, where the defendant takes a trade secret prototype from his employer’s facility, and also emails trade secret design schematics to a competitor, the prosecutor may include a count for violation of § 1832(a)(1) with respect to the stealing of the prototype and a separate count for violation of § 1832(a)(2) with respect to the emailing of the design specifications. A prosecutor may also wish to consider what other legal theories may apply to the facts of the case. See Section G. of this chapter for other charges to consider. ii. Memorization Included The above types of misappropriation include not only manipulating a physical object, but also conveying or using intangible information that has been memorized. The EEA defines a trade secret as “all forms and types of financial, business, scientific, technical, economic, or engineering information, ... whether tangible or intangible, and whether or how stored.” 18 U.S.C. § 1839(3) (emphasis added). The statute also prohibits not only actions taken against a trade secret’s physical form, such as “steal[ing], ...tak[ing], [and] IV.Theft of Commercial Trade Secrets 175 carr[ying] away”, 18 U.S.C. §§ 1831(a)(1), 1832(a)(1), but also actions that can be taken against a trade secret in a memorized, intangible form, such as “sketch[ing], draw[ing], ... download[ing], upload[ing], ..., transmit[ting], ... communicat[ing], [and] convey[ing],” 18 U.S.C. §§ 1831(a)(2), 1832(a)(2). See James H.A. Pooley et al., Understanding the Economic Espionage Act of 1996, 5 Tex. Intell. Prop. L.J. 177 (1997). In this respect, as in others, the EEA echoes civil law and some pre-EEA caselaw. See, e.g., Stampede Tool Warehouse, Inc. v. May, 651 N.E.2d 209, 217 (Ill. App. Ct. 1995) (“A trade secret can be misappropriated by physical copying or by memorization.”) (citations omitted); 4 Roger M. Milgrim, Milgrim on Trade Secrets § 15.01[e]. Trade secret cases to the contrary that do not involve the EEA are not persuasive authority on this point. This is not to say, however, that any piece of business information that can be memorized is a trade secret. As noted, the EEA does not apply to individuals who seek to capitalize on their lawfully developed knowledge, skill, or abilities. When the actions of a former employee are unclear and evidence of theft has not been discovered, it may be advisable for a company to pursue its civil remedies and make another criminal referral if additional evidence of theft is developed. Where available, tangible evidence of theft or copying is helpful in all cases to overcome the potential problem of prosecuting the defendant’s purported “mental recollections” and a defense that “great minds think alike.” iii. Lack of Authorization The crux of misappropriation is that the defendant acted “without authorization” from the trade secret’s owner. The necessary “authorization is the permission, approval, consent or sanction of the owner” to obtain, destroy, or convey the trade secret. 142 Cong. Rec. 27,116 (1996). Thus, although an employee may be authorized to possess a trade secret during his employment, he would violate the EEA if he conveyed it to a competitor without his employer’s permission. iv. Misappropriation of Only Part of a Trade Secret A defendant can be prosecuted even if he misappropriated only part of a trade secret. Using only part of the secret, so long as it too is secret, qualifies as misappropriation. Mangren Research and Dev. Corp. v. National Chem. Co., 87 F.3d 937, 943-44 (7th Cir. 1996); cf. United States v. Pemberton, 904 F.2d 515, 176 Prosecuting Intellectual Property Crimes 517 (9th Cir. 1990) (rejecting argument of defendant convicted for receiving 30 stolen technical landscape and irrigation drawings for a commercial development “that the incomplete nature of the drawings rendered them worthless,” because evidence established that “some of the drawings would have been useful to the developer, even though not entirely finished,” and the developer might have been willing to adjust the price for the drawings’ incomplete nature); United States v. Inigo, 925 F.2d 641, 653-54 (3d Cir. 1991) (Hobbs Act conviction) (rejecting defendant’s argument that the victim should not have feared economic loss because, inter alia, he possessed less than five percent of the confidential documents on a subject, and holding that “what matters is how important the documents [the defendant] had were to [the defendant], not their number”). v. Mere Risk of Misappropriation Not Prosecutable, but Attempts and Conspiracies Are A former employee cannot be prosecuted just because she was exposed to a trade secret at her former job and has now moved to a competitor. The government must establish that she knowingly stole or misappropriated a particular trade secret and did so with the “intent to convert a trade secret ... to the economic benefit of anyone other than the owner thereof, and intending or knowing that the offense will, injure any owner of that trade secret.” 18 U.S.C. § 1832(a). The intent element is considered further below. c. Knowledge The EEA contains a heightened mens rea requirement. Section 1831 requires that the government prove that the defendant (1) knowingly misappropriated a trade secret (e.g., possessed, stole, transmitted, downloaded) and (2) did so with the intent, “or knowing that the offense will benefit any foreign government, foreign instrumentality, or foreign agent.” Section 1832 requires that the government show that the defendant (1) knowingly misappropriated a trade secret (e.g., possessed, stole, transmitted, downloaded) and (2) did so “with intent to convert a trade secret ... to the economic benefit of anyone other than the owner” and (3) “intending or knowing that the offense will, injure any owner of that trade secret.” As outlined above, the first part of the mens rea requirement in an EEA case is that the defendant misappropriated the trade secret “knowingly.” As noted in the legislative history, “A knowing state of mind with respect to an element of the offense is (1) an awareness of the nature of one’s conduct, and IV.Theft of Commercial Trade Secrets 177 (2) an awareness of or a firm belief in or knowledge to a substantial certainty of the existence of a relevant circumstance, such as whether the information is proprietary economic information as defined by this statute.” S. Rep. No. 104-359, at 16 (1996). Based upon the legislative history, the government is not required to prove that the defendant knew and understood the statutory definition of a trade secret, as set forth in 18 U.S.C. § 1839(3), before acting. If the government had to prove this, the EEA would be unnecessarily narrowed in its application, which is contrary to the intent of Congress. Some violations would be nearly impossible to prosecute in a number of factual scenarios, and would amount to a willfulness mens rea requirement equivalent to that imposed for criminal copyright infringement. For example, as part of protecting and limiting a trade secret to those on a need to know basis, some companies do not divulge all of the reasonable measures used to protect the trade secret, even within the company. The individual stealing a trade secret may not know about these reasonable measures safeguarding the trade secret. The legislative history is clear that Congress intended to extend the reach of the new federal offenses involving trade secret misappropriation. In fact, the legislative history supports a “knew or should have known” mens rea requirement: It is not necessary that the government prove that the defendant knew his or her actions were illegal, rather the government must prove that the defendant’s actions were not authorized by the nature of his or her relationship to the owner of the property and that the defendant knew or should have known that fact. H.R. Rep. No. 104-788, at 12 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4030-31 (emphasis added); 142 Cong. Rec. 27,117 (1996) (government must show the defendant was “aware or substantially certain” he was misappropriating a trade secret); see also United States v. Genovese, 409 F. Supp. 2d 253, 258 (S.D.N.Y. 2005) (discussing circumstances that would indicate that EEA defendant knew the information was proprietary). Congress did not require the government to show that the defendant specifically was aware of each element of the definition of a trade secret under § 1839(3) (e.g., that the defendant knew of specific reasonable measures employed by the trade secret owner to protect the trade secret). An opportunistic defendant, such as a company outsider, may not be fully 178 Prosecuting Intellectual Property Crimes aware of all of the company measures used to safeguard a trade secret, but does know the proprietary information has value which he intends to use to injure the owner of the trade secret. In other words, the defendant knowingly misappropriated property (or proprietary information) belonging to someone else without permission. In fact, in recognizing this point, the Sixth Circuit has held that the “defendant need not have been aware of the particular security measures taken by [the trade secret owner]. Regardless of his knowledge of those specific measures, defendant knew the information was proprietary.” Krumrei, 258 F.3d at 539 (affirming denial of motion to dismiss indictment as void for vagueness); see also United States v. Roberts, No. 3:08-CR-175, 2009 WL 5449224, at *7 (E.D. Tenn. Nov. 17, 2009) (holding that “a defendant must know that the information he or she seeks to steal is proprietary, meaning belonging to someone else who has an exclusive right to it, but does not have to know that it meets the statutory definition of a trade secret”), report and recommendation adopted by, 2010 WL 56085 (E.D. Tenn. Jan. 5, 2010) (quoting H.R. Rep. No. 104-788, at 12 (1996)). An example demonstrates why it logically follows that the government is not required to prove the defendant was aware of each of the sub-elements of the trade secret definition under §1839(3), including his knowledge of the trade secret owner’s specific reasonable measures taken to safeguard the trade secret. Assume a hacker infiltrates a company’s corporate network and copies sensitive research and development materials regarding a product the company is developing for future release. The hacker may not know all the steps the company has taken to protect its information such as requiring its employees to sign non-disclosure agreements, employing physical security measures at its offices or restricting sensitive information to its employees on a need-to-know basis. However, the hacker did overcome the company’s electronic security measures and knowingly misappropriated sensitive research and development information, which he shared with others, either intending to benefit another country or injure the owner of the trade secret. By the nature of his relationship with the trade secret owner, the defendant is aware the property belongs to someone else and that he misappropriated it without the authorization of the company. As already noted, in drafting the statute, Congress already included a heightened intent standard. For example, § 1831 requires the government to prove that the defendant intended or knew his actions would benefit a foreign government, foreign instrumentality, or foreign agent. See generally IV.Theft of Commercial Trade Secrets 179 Chung, 659 F.3d at 828 (discussing intent standard). The information must in fact be a trade secret (unless, as discussed in Section B.6. of this Chapter, attempt or conspiracy is charged). Additionally, the government must show that the defendant knowingly stole, or without authorization appropriated, took, carried away, possessed or concealed, or by fraud, artifice, or deception obtained trade secret information. Under §1832, the government must prove that the defendant intended “to convert a trade secret ... to the economic benefit of anyone other than the owner” of the trade secret, “intending or knowing that the offense will, injure any owner of that trade secret,” and “knowingly” misappropriated the trade secret information. As with § 1831, the information must in fact be a trade secret (unless attempt or conspiracy is charged), and the government must show that the defendant knowingly stole, or without authorization appropriated, took, carried away, possessed or concealed, or by fraud, artifice, or deception obtained trade secret information. Under the last element (knowingly stole a trade secret), the government must show that the defendant knowingly misappropriated (e.g., possessed or concealed) information belonging to the trade secret owner; in other words, the defendant knowingly misappropriated property belonging to someone else without permission. A recent district court opinion following a bench trial of a § 1831 case directly addressed the mens rea requirement of the EEA, concluding that the Government must prove that the defendant knew the information he misappropriated was actually a trade secret (which included proof of the defendant’s knowledge of the sub-elements of the definition of a trade secret). See Chung, 633 F. Supp. 2d 1134 (bench trial conviction of a former Boeing employee of economic espionage with the intent to benefit a foreign government). The government asserted that the term “knowingly” modified only the active conduct elements of the offense (“receives, buys, or possesses”) and did not require proof that the defendant knew the information at issue fell within the precise statutory definition of a trade secret, as set forth in the EEA. Id. Acknowledging that the statutory language of § 1831(a)(3) is not explicitly clear whether the word “knowingly” modifies “trade secret,” the court concluded that canons of statutory construction supported an interpretation requiring proof that the defendant knew the information he received, possessed 180 Prosecuting Intellectual Property Crimes or bought was a trade secret. Id. at 1145. However, the court found that this was not a difficult element to satisfy, at least based on the facts presented in the Chung case: A defendant charged with economic espionage will necessarily have some understanding of the measures that have been taken to protect the information he possesses. He will know whether the facility he acquired the information from was gated. He will know if the information in his possession has proprietary, trade secret, or classified markings. If he is an employee, he will know his company’s policy about whether documents can be taken home. The Government need not prove that a defendant knew all of the security measures taken to protect the information. Likewise, proving that a defendant charged with economic espionage knows that the information he possesses has economic value is not exceedingly difficult. A spy does not deal in worthless or readily ascertainable information. Id. at 1145-46. Moreover, the court was clear that this element did not require the government to prove that the defendant knew his conduct was illegal. Id. In contrast to the district court, however, in considering the sufficiency of the evidence, the Ninth Circuit did not require the defendant to know that the information he misappropriated was actually a trade secret. See Chung, 659 F.3d at 824-28. Rather, the Ninth Circuit concluded that the evidence was sufficient to support the trial conviction and that a trade secret had been established. Based on the statute and legislative history, noted above, the government should be able to satisfy the “knowingly” requirement by showing that the defendant knew or had a firm belief that the information was proprietary; was valuable to its owner because it was not generally known to the public; and that its owner had taken measures to protect it, that is, the information had the attributes of a trade secret described in § 1839(3). See 18 U.S.C. § 1839(3); H.R. Rep. No. 104-788, at 12 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4030-31 (“the government must prove that the defendant’s actions were not authorized by the nature of his or her relationship to the owner of the property and that the defendant knew or should have known that fact”); Krumrei, 258 F.3d at 539 (“defendant need not have been aware of the particular security measures taken by” the trade secret owner; “Regardless of his knowledge of IV.Theft of Commercial Trade Secrets 181 those specific measures, defendant knew the information was proprietary.”); cf. Genovese, 409 F. Supp. 2d at 258 (discussing alleged circumstances that would indicate that EEA defendant knew the information was proprietary). Evidence that the defendant was aware of confidentiality agreements or policies concerning the information, proprietary markings and other security measures taken by the information’s owner will help to satisfy this element. On the other hand, a person cannot be prosecuted under the EEA if “[a] person [took] a trade secret because of ignorance, mistake, or accident.” 142 Cong. Rec. 27,117 (1996). Nor could he be prosecuted if “he actually believed that the information was not proprietary after [he took] reasonable steps to warrant such belief.” Id. 4. Additional 18 U.S.C. § 1831 Element: Intent to Benefit a Foreign Government, Foreign Instrumentality, or Foreign Agent Under 18 U.S.C. § 1831, the second mens rea requirement is that the defendant intended or knew that the offense would “benefit” a “foreign government, foreign instrumentality, or foreign agent.” Under this section, there is no requirement to show the government’s role to obtain the trade secret (even where such proof may be present); the focus is on the defendant’s knowledge that the offense would benefit or intent to benefit the “foreign government, foreign instrumentality, or foreign agent.” See generally Chung, 659 F.3d at 828 (“Unlike the foreign agent count, which required evidence of a foreign government’s direction or control, criminal liability under the EEA may be established on the basis of Defendant’s intent alone.”; concluding that the defendant’s intent was shown by his supplying technical information in response to requests for such information from Chinese officials and by his continuing possession of trade secret materials relating to the space shuttle and the Delta IV Rocket), cert. denied, _ U.S. _ (2012). Consequently, normally evidence regarding the conduct or intent of the foreign government or its officials is not a requirement to establish a violation under § 1831. A “foreign instrumentality” is “any agency, bureau, ministry, component, institution, association, or any legal, commercial, or business organization, corporation, firm, or entity that is substantially owned, controlled, sponsored, commanded, managed, or dominated by a foreign government.” 18 U.S.C. § 1839(1). A “foreign agent” is “any officer, employee, proxy, servant, delegate, or representative of a foreign government.” 18 U.S.C. § 1839(2). Thus, the government must show that the defendant knew or had a firm belief that misappropriation would benefit an entity controlled by a foreign government. 182 Prosecuting Intellectual Property Crimes If this “entity” is not a government entity per se, such as a business, there must be “evidence of foreign government sponsored or coordinated intelligence activity” with the entity. 142 Cong. Rec. 27,116 (1996). The “benefit” to the foreign entity should be interpreted broadly. As the House Report clarified: The defendant did not have to intend to confer an economic benefit to the foreign government, instrumentality, or agent, to himself, or to any third person. Rather, the government need only prove that the actor intended that his actions in copying or otherwise controlling the trade secret would benefit the foreign government, instrumentality, or agent in any way. Therefore, in this circumstance, benefit means not only an economic benefit but also reputational, strategic, or tactical benefit. H.R. Rep. No. 104-788, at 11 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4030. The requirement that the benefit accrue to a foreign government, instrumentality, or agent should be analyzed very carefully. To establish that the defendant intended to benefit a “foreign instrumentality,” the government must show that the entity was “substantially owned, controlled, sponsored, commanded, managed, or dominated by a foreign government.” 18 U.S.C. § 1839(1) (emphasis added). The EEA does not define “substantially,” but the legislative history clarifies that the prosecution need not prove complete ownership, control, sponsorship, command, management, or domination: Substantial in this context, means material or significant, not technical or tenuous. We do not mean for the test of substantial control to be mechanistic or mathematical. The simple fact that the majority of the stock of a company is owned by a foreign government will not suffice under this definition, nor for that matter will the fact that a foreign government only owns 10 percent of a company exempt it from scrutiny. Rather the pertinent inquiry is whether the activities of the company are, from a practical and substantive standpoint, foreign government directed. 142 Cong. Rec. 27,116 (1996). IV.Theft of Commercial Trade Secrets 183 Thus, § 1831 does not apply to a defendant who intended who knew that the offense would benefit a foreign corporation not substantially controlled by a foreign government. Id. In such an instance, however, the defendant could still be properly charged under 18 U.S.C. § 1832. Before charges may be filed under § 1831, the Counterespionage Section (CES), National Security Division (NSD) must approve. The USAM provides: The United States may not file a charge under 18 U.S.C. § 1831 of the Economic Espionage Act (hereinafter the “EEA”), or use a violation under § 1831 of the EEA as a predicate offense under any other law, without the approval of the Assistant Attorney General for the [National Security Division] (or the Acting official if a position is filled by an acting official). Responsibility for reviewing requests for approval of charges to be brought under § 1831 rests with the Counterespionage Section which shall obtain approval from the Assistant Attorney General for the [National Security Division].” USAM 9-59.100; see also USAM 9-2.400. CCIPS is available to assist on legal or evidence gathering questions. DOJ has strongly encouraged prosecutors to consult with CCIPS prior to filing § 1832 charges, under USAM 9-59.110 (“Prosecutors are strongly urged to consult with the Computer Crime and Intellectual Property Section before initiating prosecutions under 18 U.S.C. § 1832”), and the Memorandum from the Attorney General, Renewal of Approval Requirement Under The Economic Espionage Act of 1996, (March 1, 2002) (“I strongly urge prosecutors to consult with the Computer Crime and Intellectual Property Section (CCIPS) regarding § 1832 prosecutions prior to filing charges.”). CCIPS has provided assistance on a number of cases raising trade secret and economic espionage act issues. For questions concerning charges under § 1831, contact the Department’s Counterespionage Section, within the National Security Division, at (202) 5141187, or concerning other related issues in trade secret cases, CCIPS at (202) 514-1026. 184 Prosecuting Intellectual Property Crimes 5. Additional 18 U.S.C. § 1832 Elements a. Economic Benefit to a Third Party Under 18 U.S.C. § 1832, the government must prove that the defendant’s misappropriation was intended for the “economic benefit of anyone other than the owner thereof.” 18 U.S.C. § 1832(a). The recipient of the intended benefit can be the defendant, a competitor of the victim, or some other person or entity. One who misappropriates a trade secret but who does not intend for anyone to gain economically from the theft cannot be prosecuted under 18 U.S.C. § 1832. This requirement differs from foreign-government economic espionage under 18 U.S.C. § 1831, for which the economic or non-economic nature of the misappropriation is immaterial. Compare 18 U.S.C. § 1831(a) with § 1832(a). b. Intent to Injure the Owner of the Trade Secret Beyond demonstrating in a § 1832 case that the defendant both knew that the information he took was proprietary and that he intended the misappropriation to economically benefit someone other than the rightful owner, the government must also prove that the defendant intended to “injure” the owner of the trade secret. See 18 U.S.C. § 1832(a). This provision “does not require the government to prove malice or evil intent, but merely that the actor knew or was aware to a practical certainty that his conduct would cause some disadvantage to the rightful owner.” H.R. Rep. No. 104-788, at 11-12 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4030. By definition, for a trade secret to have value, it must confer a commercial advantage to its owner. See 18 U.S.C. § 1839(3)(B); H. R. Rep. No. 104-788, at 4. The trade secret loses its value once it is disclosed to another person for the recipient’s benefit. See H. R. Rep. No. 104-788, at 11 (“[M]isappropriation effectively destroys the value of what is left with the rightful owner.”). Absent direct evidence of an individual’s intent or knowledge that the trade secret’s owner would be injured by the theft, such as an admission, intent to injure will typically be shown through the circumstances around the individual’s conduct. Such circumstantial evidence of intent to injure could include, among other things: lying to supervisors about post-employment plans; taking steps to cover one’s tracks, such as destroying an employer’s original files after making copies for use at a new job; disclosing the victim’s trade secret information to IV.Theft of Commercial Trade Secrets 185 a competitor; using the victim’s trade secret information while working for a competitor; and directing business to a new employer while still employed by the victim. See, e.g., United States v. Martin, 228 F.3d 1, 12 (1st Cir. 2000) (intent to injure shown by “plan of competition”). As discussed in greater detail in Section C.1.a., below, lack of intent to injure is a common defense that may pose particular challenges in cases where a departing employee is apprehended or searched before he or she has the opportunity to disclose the former employer’s trade secrets to the new employer. c. Product or Service Used or Intended for Use in Interstate or Foreign Commerce On a charge of economic espionage under 18 U.S.C. § 1832, the government must prove that the trade secret was “related to a product or service used or intended for use in interstate or foreign commerce.” 18 U.S.C. § 1832 (as amended by the Theft of Trade Secrets Clarification Act, Pub. L. No. 112236, § 2, 126 Stat. 1627 (2012)); compare 18 U.S.C. § 1831 (containing no comparable language). Because the nexus to interstate or foreign commerce was likely included to provide a basis for federal jurisdiction, the government does not have to prove that they defendant knew that the trade secret was related to a product or service used or intended for use in interstate or foreign commerce. The statute’s plain text confirms this. The jurisdictional language quoted above is set off in the statute by commas to qualify which types of trade secrets fall under the statute. It precedes the word “knowingly,” thus putting it outside the elements the government must prove the defendant knew. The phrase “a product or service used or intended for use in interstate or foreign commerce” includes trade secrets developed for existing products and for future products. In the case of an existing product, this nexus can usually be satisfied by evidence of the trade secret’s connection to the current product and the product’s current or potential interstate or foreign sales. By contrast, for products still being developed, § 1832 merely requires proof that the trade secret was “related to a product or service … intended for use in interstate or foreign commerce.” 18 U.S.C. § 1832(a). A defendant might try to argue that a product still in the research and development stage is not yet “intended for use in … interstate commerce,” 18 U.S.C. § 1832, because the prototype itself is not “intended” for sale. But this argument would 186 Prosecuting Intellectual Property Crimes withhold the EEA’s protection when it was most needed. The research and development phase is often when a trade secret is most valuable. Once the final product embodying the trade secret is released to the public, the trade secret’s value can be lost because of its availability to competitors who can examine the product legitimately and obtain or deduce the trade secret for themselves. In considering the interstate commerce element of § 1832 (prior to the 2012 amendment), the court in United States v. Yang held that a patent application had a sufficient nexus to interstate commerce because it involved a product that generated $75-100 million in sales the previous year and it was related to products produced and sold in the United States and Canada; and also because the victim also had sought patents for the product in Europe. 281 F.3d 534, 551 & n.4 (6th Cir. 2002). Prior to December 28, 2012, the “interstate commerce” element of § 1832—which required that the trade secret in question be “related to or included in a product that is produced for or placed in interstate or foreign commerce”—was arguably narrower than the amended language in two ways. First, the previous language required a connection to a “product.” Second, it required that the product be “produced for or placed in” interstate commerce, rather than be related to a product or service that is “used or intended for use in” interstate or foreign commerce. In United States v. Aleynikov, the Second Circuit further narrowed what was considered a product that is “produced for or placed in” interstate comment. 676 F.3d 71 (2d Cir. 2012). In Aleynikov, a former Goldman Sachs programmer was convicted of violating 18 U.S.C. § 1832 for stealing trade secret computer source code related to Goldman Sachs’ high-frequency trading (HFT) platform. Id. at 73. HFT involves using computer algorithms to quickly analyze market movements and execute large numbers of stock trades in order to exploit tiny price discrepancies. Id. Goldman Sachs used the software code at issue in Aleynikov to facilitate the flow of information through its HFT system and to monitor system performance. Id. at 74. The district court denied defendant’s motion to dismiss, in which he argued that the high-frequency trading system source code trade secret was not sufficiently “related to or included in a ‘product’ that is ‘produced for or placed in interstate and foreign commerce.’” United States v. Aleynikov, 737 F. Supp. 2d 173 (S.D.N.Y. 2010), rev’d, 676 F.3d 71 (2d Cir. 2012). Although IV.Theft of Commercial Trade Secrets 187 the statute did not define the term “product,” the district court concluded that “[t]he ordinary meaning of ‘product’ is something that is the result of human or mechanical effort or some natural process.” Id. at 178. The court explained that the misappropriated source code satisfied this definition and further, was expressly developed to enable the company to engage in interstate and foreign commerce. Id. at 179. On appeal, the Second Circuit reversed the district court’s decision. Noting that Goldman Sachs had no intention of selling or licensing its HFT software to anyone else, the Second Circuit concluded that “because the HFT [highfrequency trading] system was not designed to enter or pass in commerce, or to make something that does, Aleynikov’s theft of source code relating to that system was not an offense under the EEA.” Aleynikov, 676 F.3d at 82. In construing the statute, the Second Circuit found that in order to give meaning to both “produced for” and “placed in” interstate commerce, the product at issue has to be either sold (i.e., placed in) in interstate commerce or produced for such placement but for its stage of development (e.g., prototypes). Id. at 80-81. In response to the Second Circuit’s decision in Aleynikov, the Theft of Trade Secrets Clarification Act made clear that Congress intends 18 U.S.C. § 1832 to cover a broader array of trade secret thefts than the Second Circuit’s narrow reading of the pre-2012 amendment version of the statute would allow. See 158 Cong. Rec. S6978 (daily ed. Nov. 27, 2012), 2012 WL 5932548 (“The clarifying legislation that the Senate will pass today corrects the [Aleynikov] court’s narrow reading to ensure that our federal criminal laws adequately address the theft of trade secrets related to a product or service used in interstate commerce.”) (statement of Sen. Leahy). This 2012 amendment changed § 1832 to read as follows: Whoever, with intent to convert a trade secret, that is related to or included in a product that is produced for or placed in a product or service used in or intended for use in interstate or foreign commerce, … This new statutory language contains two primary changes. First, it specifically applies to both products and services. Second, it replaces the requirement that the product be “produced for or placed in” interstate commerce (which the Second Circuit in Aleynikov interpreted to require that the trade secret information itself either enter or pass into commerce, or be used to “make 188 Prosecuting Intellectual Property Crimes something that does”) with a broader definition that requires only that the trade secrets at issue be related to a product or service that is “used in or intended for use in” interstate or foreign commerce. 6. Attempts and Conspiracies, Including the Impossibility Defense The EEA punishes attempts and conspiracies to misappropriate trade secrets. 18 U.S.C. §§ 1831(a)(4)-(5), 1832(a)(4)-(5). For an attempt, the defendant must (1) have the intent needed to commit a crime defined by the EEA, and (2) perform an act amounting to a “substantial step” toward the commission of that crime. Hsu, 155 F.3d at 202. For a conspiracy, the defendant must agree with one or more people to commit a violation, and one or more of the co-conspirators must commit an overt act to effect the object of the conspiracy. 18 U.S.C. §§ 1831(a)(5), 1832(a)(5). See generally Chung, 659 F.3d at 828-29 (listing elements). To convict a defendant under the EEA of attempt or conspiracy, however, the government is not required to prove that the information the defendant sought actually constituted a trade secret. Hsu, 155 F.3d at 204. In Hsu, the defendants were charged with attempting and conspiring to steal the techniques for manufacturing an anti-cancer drug from BristolMeyers Squibb. The district court compelled the government to disclose to the defendants the trade secrets at issue, on the grounds that the defendants were entitled to demonstrate that the materials were not trade secrets in fact. United States v. Hsu, 982 F. Supp. 1022, 1024 (E.D. Pa. 1997). On interlocutory appeal, the Third Circuit disagreed, holding that to prove an attempt or conspiracy under the EEA, the government need not prove the existence of an actual trade secret, but, rather, that the defendants believed that the information was a trade secret—regardless of whether the information was truly a trade secret or not— and that they conspired in doing so. Hsu, 155 F.3d at 203 (“the government need not prove that an actual trade secret was used …, because a defendant’s culpability for a charge of attempt depends only on ‘the circumstances as he believes them to be,’ not as they really are”). Thus, to prove an attempt, the government need only prove “beyond a reasonable doubt that the defendant sought to acquire information which he or she believed to be a trade secret, regardless of whether the information actually qualified as such.” Id. In reaching its conclusion the Third Circuit rejected the defendants’ contention that the government had to disclose the trade secrets so the defendants could prepare a potential defense of legal impossibility. Although IV.Theft of Commercial Trade Secrets 189 elsewhere the Third Circuit generally allowed the common-law defense of legal impossibility in cases charging attempt, it found that the EEA clearly showed Congress’s intent to foreclose an impossibility defense. Hsu, 155 F.3d at 202 (“[T]he great weight of the EEA’s legislative history evinces an intent to create a comprehensive solution to economic espionage, and we find it highly unlikely that Congress would have wanted the courts to thwart that solution by permitting defendants to assert the common law defense of legal impossibility.”). The court found it significant that “[t]he EEA was drafted in 1996, more than twenty-five years after the National Commission on Reform of the Federal Criminal Laws had concluded that the abolition of legal impossibility was already ‘the overwhelming modern position.’” Id. Lastly, the court noted that if legal impossibility were “a defense to the attempted theft of trade secrets, the government would be compelled to use actual trade secrets during undercover operations.” Id. This would “have the bizarre effect of forcing the government to disclose trade secrets to the very persons suspected of trying to steal them, thus gutting enforcement efforts under the EEA.” Id. Therefore, the court held that “legal impossibility is not a defense to a charge of attempted misappropriation of trade secrets in violation of 18 U.S.C. § 1832(a)(4).” Id. Nor is legal impossibility a defense to a charge of conspiracy to violate the EEA. Because the basis of a conspiracy charge is the “conspiratorial agreement itself and not the underlying substantive acts,” the impossibility of achieving the conspiracy’s goal is irrelevant. See Hsu, 155 F.3d at 203 (citing United States v. Jannotti, 673 F.2d 578, 591 (3d Cir.1982) (en banc)); see also United States v. Wallach, 935 F.2d 445, 470 (2d Cir. 1991); United States v. LaBudda, 882 F.2d 244, 248 (7th Cir. 1989); United States v. Petit, 841 F.2d 1546, 1550 (11th Cir. 1988); United States v. Everett, 692 F.2d 596, 599 (9th Cir. 1982). Hsu’s reasoning has been adopted by the Sixth Circuit in United States v. Yang, 281 F.3d 534, 541-45 (6th Cir. 2002); the Seventh Circuit in United States v. Lange, 312 F.3d 263, 268-69 (7th Cir. 2002); and the First Circuit in United States v. Martin, 228 F.3d 1, 13 (1st Cir. 2000). 190 Prosecuting Intellectual Property Crimes C. Defenses 1. Common Defenses a. Lack of Intent to Convert a Trade Secret A common defense in both civil trade secret misappropriation and criminal EEA cases is that the defendant did not intend to convert a trade secret for the benefit of someone other than its owner, but intended only to use publicly available information or general skills and knowledge acquired throughout the defendant’s career. The defendant’s intent to convert the trade secret is an essential element of the offense; absent proof of wrongful intent beyond a reasonable doubt, the defendant will be acquitted. See, e.g., United States v. Shiah, No. SA CR 06-92 (C.D. Cal. Feb. 19, 2008) (unpublished), available at http://court. cacd.uscourts.gov/CACD/RecentPubOp.nsf/ecc65f191f28f59b8825728f005 ddf4e/37d207fcb9587a30882573f400620823/$FILE/SACR06-92DOC.pdf. This defense is rooted in Congress’ stated purpose to differentiate between trade secrets, which are the subject matter of the EEA, and a person’s general skills and knowledge, which are not. The House Report states that the EEA does not apply “to individuals who seek to capitalize on the personal knowledge, skill, or abilities they may have developed” in moving from one job to another. H. R. Rep. No. 104-788, at 7 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4026. “The statute is not intended to be used to prosecute employees who change employers or start their own companies using general knowledge and skills developed while employed.” Id. “It is not enough to say that a person has accumulated experience and knowledge during the course of his or her employ. Nor can a person be prosecuted on the basis of an assertion that he or she was merely exposed to a trade secret while employed. A prosecution that attempts to tie skill and experience to a particular trade secret should not succeed unless it can show that the particular material was stolen or misappropriated.” 142 Cong. Rec. 27, 117 (1996); see also United States v. Martin, 228 F.3d 1, 11 (1st Cir. 2000) (emphasis in original) (Section 1832(a) “was not designed to punish competition, even when such competition relies on the know-how of former employees of a direct competitor. It was, however, designed to prevent those employees (and their future employers) from taking advantage of confidential information gained, discovered, copied, or taken while employed elsewhere.”); Shiah, No. SA CR 06-92 (same). A defendant successfully invoked this defense against § 1832 charges during a bench trial in United States v. Shiah, No. SA CR 06-92. The defendant IV.Theft of Commercial Trade Secrets 191 had been a product line manager at Broadcom, a semi-conductor company, for approximately two-and-a-half years, where he had been exposed to technical, marketing and price information on a variety of Broadcom products. Shortly after receiving a negative performance evaluation, the defendant applied for and was offered a similar position with a direct competitor. After applying for the new job, but before tendering his resignation, the defendant went about collecting electronic documents concerning matters he had worked on at Broadcom. On the same day he intended to give notice of his resignation, the defendant copied 4,700 files from his Broadcom laptop onto an external hard drive. At the defendant’s exit interview, Broadcom’s general counsel told the defendant that he was forbidden from disclosing Broadcom’s confidential information, which he said included technical documents, pricing lists and a wider range of business information. The defendant was not shown a copy of the confidentiality agreement he had signed when he started working at Broadcom. After he began working for the competitor, the defendant accessed several of the electronic Broadcom files he had kept while performing his new job. At trial, the defendant claimed he did not intend to use or disclose any of the confidential Broadcom information contained in the thousands of files he copied onto his external hard drive. Instead, he claimed he would rely on his own internal filter to use only the non-confidential and publicly available information in the thousands of documents he had copied. He considered this information to be part of his “tool kit” of information he had developed during the course of his career in the computer device industry. In support of this argument, he pointed to evidence he had copied thousands of documents from his prior employer before joining Broadcom. The defendant further testified that of the Broadcom documents he accessed after leaving the company, he used only the non-confidential information from them concerning aggregate industry information. Although the trial court found that the defendant’s pattern of access to the Broadcom files while at his new job was “suspicious,” and that the evidence indicated that it was more likely than not that defendant did intend to convert trade secrets (which would have satisfied a preponderance standard), it concluded that the government fell “just short” of proving the defendant’s intent to convert the trade secrets beyond a reasonable doubt because his alternative explanation for his conduct was sufficient to create a reasonable doubt. The 192 Prosecuting Intellectual Property Crimes court ultimately found that the defendant’s claimed “tool kit” defense was consistent with the defendant’s past practices and with his wholesale copying of files on his Broadcom laptop. The court also relied on the facts that many of the files that the defendant copied were marketing documents that contained both trade secret and non-confidential information and that there was no evidence that the confidential portions of the documents were disclosed to the defendant’s new co-workers. The court also found the defendant’s efforts to acquire certain Broadcom documents before leaving the company were equally consistent with defendant’s claimed efforts to address a point of criticism in his recent performance evaluation that he lacked detailed product knowledge as they were with a malicious intent. The Shiah case underscores the importance of developing evidence of intent to convert. Certainly the best evidence of such intent is direct evidence of disclosure of the trade secrets to the new employer or other third parties. However, evidence of disclosure is often not available when a defendant is searched or arrested shortly after leaving his or her former employer with a treasure trove of trade secrets in hand. Therefore, it will be necessary to develop circumstantial evidence of the defendant’s behavior by looking to his conduct and actions around the time of the misappropration. b. Information is Not a Trade Secret i. Owner Failed to Take Reasonable Measures to Protect Secrecy Another common defense to EEA charges is that the trade secret’s owner failed to take reasonable measures to protect the secrecy of the information at issue. As discussed in Section B.3.a.v. of this Chapter, the government is not required to prove that the victim took all available measures to keep its information secret. The standard is whether measures the owner took were reasonable under the circumstances. Although there are no reported EEA cases in which this defense was successful, the United States v. Shiah case provides detailed insight into the factors at least one trial court considered when weighing this element. Although the court ultimately found that the government had satisfied its burden beyond a reasonable doubt, it expressed concern that the measures taken by the trade secret owner “were barely sufficient to qualify as reasonable.” Shiah, No. SA CR 06-92, at 31. The court focused its concerns not on the physical or electronic security measures taken by Broadcom, but on its practices toward its employees. For example, the court found that Broadcom had not provided IV.Theft of Commercial Trade Secrets 193 the defendant with a copy of his confidentiality agreement after he signed it, and did not explain the meaning of the agreement to him both at the outset of his employment or during his exit interview. The court was also critical of Broadcom’s failure to provide regular training to its employees on protecting confidential information, and the absence of a comprehensive system in place for designating which documents were and which documents were not confidential. Finally, the court criticized Broadcom’s failure to examine the defendant’s computer immediately upon his departure. Despite these complaints, the court found that the deficiencies in the trade secret owner’s practices were not so extensive as to qualify as unreasonable, because, as a whole, the company’s measures were generally effective. This conclusion was supported by evidence that Broadcom employees generally understood what types of information the company considered to be confidential, as well as evidence that the company had a reputation of being “stingy” with its data protection. Id. at 36. As the reasonable measures element is based on what steps were taken to keep the information secret from the public, the court correctly noted that the owner is not required to keep the information secret from the trade secret owner’s own employees, because otherwise “‘no one could do any work.’” Id. at 32 (quoting Lange, 312 F.3d at 266). Nevertheless, the court stated that a company could fall short if it failed to take reasonable measures to prevent a departing employee from taking trade secrets with him upon termination. The Shiah case, and the cases discussed in Section B.3.a.v. above suggest that this defense will be successful only in situations where the victim’s security environment is so lax that disclosures of confidential information are frequent occurrences, or where a company fails to employ a combination of technical, physical and contractual tools to protect its information. ii. Information is Not Secret The government bears the burden of proving, beyond a reasonable doubt, that the alleged trade secrets derived economic value from not being generally known or readily ascertainable to the public through proper means. Defendants will often try to inject doubt into this element by presenting evidence that the alleged trade secrets were generally known to persons in the industry or that they had been publicly disclosed. This is often done through a defense expert witness who is familiar with the industry or the technology at issue. 194 Prosecuting Intellectual Property Crimes In addition, the defendant may argue that the victim has publicly disclosed some aspect of the alleged trade secret. For this reason, the prosecutor and investigator should ascertain early on whether the purported trade secret was ever disclosed, in whole or in part, and to what extent those disclosures affect the information’s status as a trade secret. These issues are discussed further in Donald M. Zupanec, Annotation, Disclosure of Trade Secret as Abandonment of Secrecy, 92 A.L.R.3d 138 (2012) and 1 Roger M. Milgrim, Milgrim on Trade Secrets §§ 1.05-1.06. The following is an overview. • Disclosure Through the Patent and Copyright Processes Information that has been disclosed in a patent application can nevertheless qualify as a trade secret between the time of the application’s submission and the patent’s issuance, as long as the patent application itself is not published by the patent office. Scharmer v. Carrollton Mfg. Co., 525 F.2d 95, 99 (6th Cir. 1975) (citing Grant v. Raymond, 31 U.S. 218, 242 (1832)); see generally Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 482-93 (1974) (noting distinct intellectual property roles served by patents and trade secrets). The patented process or device is no longer a trade secret once the application is published or the patent is issued because publication of the application or patent makes the process publicly available for all to see. Id. at 485 (citing 35 U.S.C. § 122 and 37 C.F.R. § 1.14(b)); see also On-Line Techs. v. Perkin-Elmer Corp., 253 F. Supp. 2d 313, 323-27 (D. Conn. 2003). Patent applications filed in the United States after November 29, 2000, are typically published after 18 months. At the beginning of the investigation, the prosecutor and investigator should ask the victim for copies of all published patent applications and issued patents covering the subject matter of the trade secret information to determine whether it has been disclosed. See Chapter VII of this Manual. A subsequent refinement or enhancement to the patented technology may be a trade secret if it is not reasonably ascertainable from the published patent itself. See United States v. Hsu, 185 F.R.D. 192, 200 (E.D. Pa. 1999). Even where some elements are publicly known through a patent application, trade secret status may be found where non-public elements are included. See, e.g., Penalty Kick Mgmt. Ltd. v. Coca Cola Co., 318 F.3d 1284, 1291 (11th Cir. 2003) (concluding that beverage label marketing and production process qualified as a trade secret since “nothing in the ... patent application dealt with the production elements used to produce” the labels). IV.Theft of Commercial Trade Secrets 195 Substantially the same analysis applies to information that has been submitted to the United States Copyright Office for registration. Submitting material to the Copyright Office can render it open to public examination and viewing, thus destroying the information’s value as a trade secret, unless the material is submitted under special procedures to limit trade secret disclosure. See Tedder Boat Ramp Sys., Inc. v. Hillsborough County, Fla., 54 F. Supp. 2d 1300, 1303-04 (M.D. Fla. 1999); Religious Tech. Ctr. v. Netcom On-Line Commc’n Servs., Inc., 923 F. Supp. 1231, 1255 n.28 (N.D. Cal. 1995); 1 Milgrim on Trade Secrets § 1.06[6]-[9]. But see Compuware Corp. v. Serena Software Int’l, Inc., 77 F. Supp. 2d 816 (E.D. Mich. 1999) (holding that material could continue to be a trade secret even after its owner submitted it to the Copyright Office without redaction, because the owner had taken other steps to keep it secret and there was no evidence that it had become known outside the owner’s business). • Disclosure Through Industry Publications or Conferences Information can also lose protection as a trade secret through accidental or intentional disclosure by an employee at a conference or trade show, or in technical journals or other publications. See, e.g., Mixing Equip. Co. v. Philadelphia Gear, Inc., 436 F.2d 1308, 1311 n.2 (3d Cir. 1971) (holding that industrial mixing equipment charts and graphs lost trade secret status through publication in trade journals). • Disclosure to Licensees, Vendors, and Third Parties Information that has been disclosed to licensees, vendors, or third parties for limited purposes can remain a trade secret under some circumstances, including covering the disclosures by a non-disclosure agreement. See, e.g., Lange, 312 F.3d at 266; Rockwell Graphic Sys., Inc. v. DEV Indus., Inc., 925 F.2d 174, 177 (7th Cir. 1991). For the security measures the trade secret owner should take to maintain secrecy during those disclosures, see Section B.3.a.v., of this Chapter. • Disclosure Through Internet Postings A trade secret can lose its protected status after it is posted anonymously on the Internet, even if the trade secret was originally gathered through improper means. See Religious Tech. Ctr. v. Netcom On-Line Communication Servs., Inc., 923 F. Supp. 1231 (N.D. Cal. 1995). If the Internet posting causes the information to fall into the public domain, a person who republishes the 196 Prosecuting Intellectual Property Crimes information is not guilty of misappropriating a trade secret, even if he knew that the information was originally acquired by improper means. DVD Copy Control Ass’n Inc. v. Bunner, 10 Cal. Rptr. 3d 185, 194 (Cal. Ct. App. 2004). “[T]hat which is in the public domain cannot be removed by action of the states under the guise of trade secret protection.” Id. at 195. Disclosure over the Internet may not always strip away a trade secret’s protection automatically. For example, in United States v. Genovese, the court held that a trade secret could retain its secrecy despite a brief disclosure over the Internet: “[A] trade secret does not lose its protection under the EEA if it is temporarily, accidentally or illicitly released to the public, provided it does not become ‘generally known’ or ‘readily ascertainable through proper means.’” 409 F. Supp. 2d 253, 257 (S.D.N.Y. 2005) (citing 18 U.S.C. § 1839(3)(B)). Publication on the Internet may not destroy the trade secret’s status “if the publication is sufficiently obscure or transient or otherwise limited so that it does not become generally known to the relevant people, i.e., potential competitors or other persons to whom the information would have some economic value.” DVD Copy Control Ass’n Inc., 10 Cal. Rptr. 3d at 192-93. • Disclosure During Law Enforcement Investigations Disclosures to the government to assist an investigation or prosecution of an EEA case should not waive trade secret protections. See United States v. Yang, 1999 U.S. Dist. LEXIS 7130 (N.D. Ohio Mar. 18, 1999) (holding that victim’s disclosure of trade secret to government for use in a sting operation under oral assurances that the information would not be used or disclosed for any purpose unrelated to the case did not vitiate trade secret status). Disclosure to the government is essential for the investigation and prosecution of illegal activity and is expressly contemplated by the EEA. First, 18 U.S.C. § 1833(2) specifically encourages disclosures to the government, stating: “[the EEA] does not prohibit ... the reporting of a suspected violation of law to any governmental entity of the United States ... if such entity has lawful authority with respect to that violation.” Second, 18 U.S.C. § 1835 authorizes the court to “enter such orders and take such other action as may be necessary and appropriate to preserve the confidentiality of trade secrets, consistent with the requirements of the Federal Rules of Criminal and Civil Procedure ... and all other applicable laws.” See also infra Section D. of this Chapter. Section 1835 gives “a clear indication from Congress that trade secrets are to be protected to the fullest extent during EEA litigation.” Hsu, 155 F.3d at 197. Together, these sections demonstrate Congress’s intent to encourage the reporting of an EEA violation. IV.Theft of Commercial Trade Secrets 197 Laws other than the EEA similarly limit the Department of Justice’s disclosure of trade secrets without the consent of the trade secret owner or the express written authorization of senior officials at the Department. See, e.g., 28 C.F.R. § 16.21 (2012). Information does not lose its status as a trade secret if the government discloses it to the defendant as “bait” during a sting operation. See United States v. Hsu, 185 F.R.D. 192, 199 (E.D. Pa. 1999). “To hold that dangling such bait waives trade secret protection would effectively undermine the Economic Espionage Act at least to the extent that the Government tries ... to prevent an irrevocable loss of American technology before it happens.” Id. • Disclosure by the Original Misappropriator or His Co-Conspirators The person who originally misappropriates a trade secret cannot immunize himself from prosecution by disclosing it into the public domain. Although disclosure of a trade secret may cause it to lose trade-secret status after the disclosure, disclosure does not destroy trade-secret status retroactively. Consequently, one who initiates the disclosure may be prosecuted, whereas one who distributes the information post-disclosure may not, unless he was working in concert with the original misappropriator. Cf. Underwater Storage, Inc. v. United States Rubber Co., 371 F.2d 950, 955 (D.C. Cir. 1966) (“We do not believe that a misappropriator or his privies can ‘baptize’ their wrongful actions by general publication of the secret.”); Religious Tech. Ctr., 923 F. Supp. at 1256. 2. Parallel Development The essence of the parallel development defense is that the defendant independently, through its own efforts, developed the same information as the putative victim, without access to the victim’s trade secrets. Indeed, the owner of a trade secret, unlike the holder of a patent, does not have “an absolute monopoly on the information or data that comprises a trade secret.” 142 Cong. Rec. 27,116 (1996). Other companies and individuals have the right to discover the information underlying a trade secret through their own research and hard work; if they do, there is no misappropriation under the EEA. Id. Of course, this defense would prove ineffective where direct evidence of the defendant’s acquisition of the trade secrets from the victim exists. 198 Prosecuting Intellectual Property Crimes 3. Reverse Engineering Similarly, a person may legally discover the information underlying a trade secret by “reverse engineering,” that is, the practice of taking apart something that was legally acquired to determine how it works or how it was made or manufactured. See, e.g., Kewanee Oil Co. v. Bicron Corp., 416 U.S. 470, 476 (1974) (holding that the law does not protect the owner of a trade secret from “discovery by fair and honest means, such as by independent invention, accidental disclosure, or by so-called reverse engineering”); ConFold Pac., Inc. v. Polaris Indus., 433 F.3d 952, 959 (7th Cir. 2006) (“[I]t is perfectly lawful to ‘steal’ a firm’s trade secret by reverse engineering.”) (Posner, J.) (citations omitted). Although the EEA does not expressly address when reverse engineering is a valid defense, its legislative history states that “[t]he important thing is to focus on whether the accused has committed one of the prohibited acts of this statute rather than whether he or she has ‘reverse engineered.’ If someone has lawfully gained access to a trade secret and can replicate it without violating copyright, patent or this law, then that form of ‘reverse engineering’ should be fine.” 142 Cong. Rec. 27,116 (1996). The mere fact that a particular secret could have been reverse engineered after a time-consuming and expensive laboratory process does not provide a defense for someone who intended to avoid that time and effort by stealing the secret, unless the information was so apparent as to be deemed “readily ascertainable,” and thus not a trade secret. See 4 Roger M. Milgrim, Milgrim on Trade Secrets § 15.01[1][d][v]; Alcatel USA, Inc. v. DGI Techs., Inc., 166 F.3d 772, 784-85 (5th Cir. 1999) (holding that a competitor could not assert reverse engineering defense after it had first unlawfully obtained a copy of the software and then used the copy to reverse engineer); Pioneer Hi-Bred Int’l v. Holden Found. Seeds, Inc., 35 F.3d 1226, 1237 (8th Cir. 1994) (stating that fact “that one ‘could’ have obtained a trade secret lawfully is not a defense if one does not actually use proper means to acquire the information”) (citations omitted); Telerate Sys., Inc. v. Caro, 689 F. Supp. 221, 233 (S.D.N.Y. 1988) (“[T]he proper focus of inquiry is not whether an alleged trade secret can be deduced by reverse engineering but rather, whether improper means are required to access it.”). IV.Theft of Commercial Trade Secrets 199 To counter a defense of reverse engineering, prosecutors should establish how the defendant obtained the trade secret. Proving misappropriation should refute a claim of reverse engineering. 4. Legal Impossibility The defense of legal impossibility has largely been rejected by courts in EEA prosecutions. See Section B.6. of this Chapter. 5. Advice of Counsel “There is no such thing as an ‘advice of counsel’ defense.” United States v. Urfer, 287 F.3d 663, 665 (7th Cir. 2002) (Posner, J.) (charges of willfully injuring federal property). Rather, “if a criminal statute requires proof that the defendant knew he was violating the statute in order to be criminally liable for the violation, and it is unclear whether the statute forbade his conduct, the fact that he was acting on the advice of counsel is relevant because it bears on whether he knew that he was violating the statute.” Id. at 666. In other words, advice of counsel is a defense only if it negates the mens rea needed to prove a violation. Advice of counsel could conceivably negate an EEA defendant’s mens rea in several ways. As is discussed in Section B.3.c. of this Chapter, the defendant cannot be convicted unless he knew that he was misappropriating a trade secret. Thus, the defendant’s mens rea might be negated if counsel advised him either that the information in question was not a trade secret or that it was a trade secret to which he could claim ownership. To rely on an advice of counsel claim at trial, the defendant must first provide “independent evidence showing (1) the defendant made full disclosure of all material facts to his or her attorney before receiving the advice at issue; and (2) he or she relied in good faith on the counsel’s advice that his or her course of conduct was legal.” Covey v. United States, 377 F.3d 903, 908 (8th Cir. 2004) (citations and alterations omitted); United States v. Munoz, 233 F.3d 1117, 1132 (9th Cir. 2000) (noting an advice of counsel instruction requires proof that the defendant “fully disclosed to his attorney all material facts and relied in good faith on the attorney’s recommended course of conduct”); see also United States v. Butler, 211 F.3d 826, 833 (4th Cir. 2000) (same). Both elements must be shown. Under the full disclosure requirement, the information may not be mischaracterized and all material facts must be provided. See, e.g., United States 200 Prosecuting Intellectual Property Crimes v. Munoz, 233 F.3d 1117, 1132 (9th Cir. 2000) (in mail fraud prosecution, defendant was not entitled to an advice of counsel instruction where, among other things, attorney’s opinion letter was based on misrepresentations that investments were not advertised to general public even though defendant “honestly believed the opinion letters written by the attorneys were accurate and … did not understand the importance of not advertising … to the general public”); United States v. Kenney, 911 F.2d 315, 322 (9th Cir. 1990) (holding that defendant did not make a full disclosure where the defendant mischaracterized a kickback as an interest-free loan); United States v. Conforte, 624 F.2d 869, 877 (9th Cir. 1980) (noting a material fact is any “fact[] to which the advice pertains”); United States v. Stirling, 571 F.2d 708, 735 (2d Cir. 1978) (rejecting defendants’ argument that attorneys failed to ask sufficiently probing questions because attorneys had “no obligation to ferret out proof of wrongdoing.”). Under the good faith reliance requirement, the client must rely on the recommended course of conduct and cannot act before receiving the legal advice. See, e.g., United States v. Cheek, 3 F.3d 1057, 1061-62 (7th Cir. 1993) (advice of counsel instruction did not apply because defendant who had been warned of illegality “merely continued a course of illegal conduct begun prior to contacting counsel”); Conforte, 624 F.2d at 877 (rejecting a reliance on counsel defense because, among other reasons, the defendant did not speak to his attorney until after the crimes had been committed); see also United States v. Polytarides, 584 F.2d 1350, 1353 (4th Cir. 1978) (good faith reliance on advice of counsel defense was not available when defendant had taken significant steps toward the illegal activity and had been warned of its illegality prior to seeking advice of an attorney). 6. Claim of Right—Public Domain and Proprietary Rights As is discussed in Section B.3.c. of this Chapter, the defendant cannot be convicted unless he knew that the information he was misappropriating was proprietary. Thus, the defendant’s mens rea might be negated if he believed in good faith that he had a right to use the information, either because it was in the public domain or because it belonged to him. The former situation, information in the public domain, is discussed in Section B.3.a.iii. (discussing how disclosure affects trade secret status). The latter situation, when the accused acts under a proprietary claim of right, can occur when two parties have a legitimate dispute over who owns the trade secret. This type of dispute is most likely to occur after the parties IV.Theft of Commercial Trade Secrets 201 developed technology together and their respective ownership interests are unclear. In these circumstances, one party’s unilateral action with regard to the trade secret might precipitate a criminal referral from the other party. Such cases are rarely appropriate for criminal prosecution, especially if the putative defendant acted on the advice of counsel. See Section C.5. of this Chapter. Notwithstanding the passage of the EEA, many disputes about trade secrets are still best resolved in a civil forum. 7. The First Amendment The First Amendment provides no defense when the defendant’s speech itself is the very vehicle of the crime. See, e.g., United States v. Morison, 844 F.2d 1057, 1068 (4th Cir. 1988) (rejecting defendant’s First Amendment defense and upholding a conviction for a violation of 18 U.S.C. § 793 for stealing secret government documents, noting that “[w]e do not think that the First Amendment offers asylum ... merely because the transmittal was to a representative of the press”); United States v. Rowlee, 899 F.2d 1275 (2d Cir. 1990) (rejecting First Amendment defense against charges of tax evasion conspiracy). In a prosecution similar to the theft of trade secrets under the EEA, the First Amendment was held to provide no defense to a charge under 18 U.S.C. § 2314 for the interstate transportation of stolen computer files: In short, the court finds no support for [the defendant’s] argument that the criminal activity with which he is charged ... is protected by the First Amendment. Interpreting the First Amendment as shielding [the defendant] from criminal liability would open a gaping hole in criminal law; individuals could violate criminal laws with impunity simply by engaging in criminal activities which involve speech-related activity. The First Amendment does not countenance that kind of end run around criminal law. United States v. Riggs, 743 F. Supp. 556, 560-61 (N.D. Ill. 1990). In most instances, if the government can establish that the defendant intended his misappropriation to benefit a third party economically, he should have a hard time claiming that his disclosure of the trade secret was protected by the First Amendment. In other words, where the defendant’s motivation was pecuniary, the defendant’s argument that he disclosed the trade secret as a public service or to educate the public should be significantly undermined. 202 Prosecuting Intellectual Property Crimes See DVD Copy Control Ass’n v. Bunner, 10 Cal. Rptr. 3d 185, 194-96 (Cal. Ct. App. 2004). Because the First Amendment does not protect speech that is criminal, the government should seek to exclude evidence regarding that defense through an appropriate motion in limine. 8. Void-for-Vagueness Several defendants have challenged the EEA on grounds that it is vague or otherwise unconstitutional. Thus far, all such challenges have been rejected. In United States v. Hsu, 40 F. Supp. 2d 623 (E.D. Pa. 1999), the defendant was charged with, among other things, conspiracy to steal trade secrets in violation of 18 U.S.C. § 1832(a)(5) and attempted theft of trade secrets in violation of 18 U.S.C. § 1832(a)(4). Hsu moved to dismiss, arguing that the EEA was unconstitutionally vague in numerous respects. In denying Hsu’s motion to dismiss, the court noted that a statute is not unconstitutionally vague just because “Congress might, without difficulty, have chosen ‘clearer and more precise language’ equally capable of achieving the end which it sought.” Hsu, 40 F. Supp. 2d at 626 (quoting United States v. Powell, 423 U.S. 87, 94 (1975) (citation omitted)). Because the First Amendment was not implicated, Hsu’s void-for-vagueness challenge could succeed only if the EEA were vague as applied to his conduct and as applied to “the facts of the case at hand.” Id. at 626-27. Hsu argued that the First Amendment was implicated because the Bristol-Meyers Squibb “employee who aided the Government ‘sting’ operation by posing as a corrupt employee [had] a right freely to express himself and exchange information with the defendant, or with anyone else he [thought was] a potential employer.” Id. at 627 (citations omitted). The court disagreed. It noted first that Hsu lacked standing to raise the victim’s employee’s purported First Amendment rights. Id. And even if Hsu had standing, the court said, the employee had knowingly participated in a government sting operation, not in a job interview with a potential employer. Id. Therefore, no First Amendment interests were implicated. Id. The court also rejected Hsu’s argument that the term in the pre-2012 amendment version of 18 U.S.C. § 1832 “related to or included in a product that is produced for or placed in interstate or foreign commerce is unacceptably vague.” Id. Prior First Amendment decisions disapproving of the term “related” had no bearing on the use of “related to or included in” in the EEA, which the IV.Theft of Commercial Trade Secrets 203 court found “readily understandable to one of ordinary intelligence, particularly here, where the defendant appears to be well versed as to [the nature of the technology at issue].” Id. The court also concluded that the EEA’s definition of “trade secret” was not unconstitutionally vague as applied to Hsu. As to the requirement that the owner take “reasonable measures” to keep the information secret, the mere use of the word “reasonable” or “unreasonable” does not render a statute vague. Id. at 628. The court further noted that these terms were taken “with only minor modifications” from the Uniform Trade Secrets Act, which had been adopted in forty states and the District of Columbia and had also withstood a void-forvagueness attack. Id. Also undermining Hsu’s void-for-vagueness challenge was his own knowledge of the facts at the time of the offense. Hsu knew that Bristol-Meyers Squibb had taken many steps to keep its technology secret. He had been told on several occasions that the technology was proprietary to Bristol-Meyers Squibb, could not be acquired through a license or joint venture, and could be obtained only through an allegedly corrupt employee. The court therefore held that he could not contend that the term “reasonable measures” was vague as applied to him. Id. Finally, the Hsu court concluded that the EEA was not void for vagueness in qualifying that the information not be “generally known to” or “readily ascertainable by” the public. The court concluded that the EEA’s use of those terms was problematic because “what is ‘generally known’ and ‘readily ascertainable’ about ideas, concepts, and technology is constantly evolving in the modern age.” Id. at 630. Nonetheless, Hsu’s emails, telephone calls, and conversations together showed that he believed that the information he sought could not be acquired through legal or public means. Therefore, the court concluded that the EEA’s definition of trade secret was not unconstitutionally vague as applied to Hsu. Id. at 630-31. Subsequent courts have upheld the EEA against similar constitutional challenges. See United States v. Yang, 281 F.3d 534, 544 n.2 (6th Cir. 2002) (rejecting defendants’ argument that the EEA would be unconstitutionally vague if attempt and conspiracy charges need not be based on actual trade secrets, because “[w]e have every confidence that ordinary people seeking to steal information that they believe is a trade secret would understand that their conduct is proscribed by the statute”); United States v. Kumrei, 258 F.3d 204 Prosecuting Intellectual Property Crimes 535, 539 (6th Cir. 2001) (rejecting claim that the “reasonable measures” were unconstitutionally vague); Chung, 622 F. Supp. 2d at 974 (concluding “the term ‘reasonable measures’ is not unconstitutionally vague”); United States v. Genovese, 409 F. Supp. 2d 253 (S.D.N.Y. 2005) (denying motion to dismiss indictment as vague by defendant who argued that, having found confidential source code on the Internet, he could not know whether the code was generally known to the public or whether the code’s owners took reasonable measures to keep it secret, and ruling that the government’s allegations established that the defendant was on notice that the code was proprietary and any protective measures had been circumvented). D. Preserving Confidentiality and the Use of Protective Orders One essential objective in any trade secret prosecution is to ensure that an effective protective order is in place to safeguard against disclosure of the trade secret during prosecution of the criminal case. The safeguards should cover each phase of the prosecution, including discovery and any public proceedings, such as a trial or sentencing hearing. 1. Overview Protective orders, or other appropriate measures, are commonly used in civil cases involving trade secrets. See, e.g., Fed. R. Civ. P. 26(c)(1)(g) (providing for civil protective orders “requiring that a trade secret or other confidential research, development, or commercial information not be revealed or be revealed only in a specified way”); see also Burlington N.R.R. Co. v. Omaha Pub. Power Dist., 888 F.2d 1228, 1232 (8th Cir. 1989) (reviewing contract in camera without revealing trade secret); Canal Refining Co. v. Corrallo, 616 F. Supp. 1035, 1045 (D.D.C. 1985) (granting plaintiff’s motion for protective order to seal separate portions of affidavit designated as exhibit); see generally 3 Roger M. Milgrim, Milgrim on Trade Secrets § 14.02[4] (discussing protective orders and other measures). Likewise, protective orders are regularly used in EEA cases to protect against disclosure of trade secrets. Congress emphasized the need for protective orders in criminal cases involving trade secrets. See H. R. Rep. No. 104-788, at 4 (1996), reprinted in 1996 U.S.C.C.A.N. 4021, 4022 (“The bill requires courts hearing cases brought under the statute to enter such orders as may be necessary to protect IV.Theft of Commercial Trade Secrets 205 the confidentiality of the information involved in the case.”); id. at 13, 4032 (“The intent of this section is to preserve the confidential nature of the information and, hence, its value. Without such a provision, owners may be reluctant to cooperate in prosecutions for fear of further exposing their trade secrets to public view, thus further devaluing or even destroying their worth.”). The legislative history underscores the importance of courts taking adequate steps to protect trade secrets particularly in the early stages of prosecution even before a determination that the information is a trade secret has been made: We have been deeply concerned about the efforts taken by courts to protect the confidentiality of a trade secret. It is important that in the early stages of a prosecution the issue whether material is a trade secret not be litigated. Rather, courts should, when entering these orders, always assume that the material at issue is in fact a trade secret. 142 Cong. Rec. 12,213 (Oct. 2, 1996) (Manager’s Statement) (emphasis added). The EEA contains a specific provision authorizing protective orders in trade secret cases. Specifically, § 1835 provides: [T]he court shall enter such orders and take such other action as may be necessary and appropriate to preserve the confidentiality of trade secrets, consistent with the requirements of the Federal Rules of Criminal and Civil Procedure, the Federal Rules of Evidence, and all other applicable laws. An interlocutory appeal by the United States shall lie from a decision or order of a district court authorizing or directing the disclosure of any trade secret. In addition to § 1835, which applies to EEA cases, prosecutors can alternatively consider Fed. R. Crim. P. 16(d), which provides: (1) Protective and Modifying Orders. At any time the court may, for good cause, deny, restrict, or defer discovery or inspection, or grant other appropriate relief. The court may permit a party to show good cause by a written statement that the court will inspect ex parte. If relief is granted, the court must preserve the entire text of the party’s statement under seal. 206 Prosecuting Intellectual Property Crimes Rule 16(d) has been cited as an alternative legal basis for a protective order in cases involving trade secrets. See, e.g., United States v. Hsu, 155 F.3d 189, 193 (3d Cir. 1998) (noting “the government filed a motion pursuant to 18 U.S.C. § 1835 and Fed. R. Crim. P. 16(d)(1) for a protective order to prevent the disclosure of the Bristol–Myers trade secrets allegedly contained in those documents”). Although both provisions authorize protective orders, their coverage and application are distinct. Rule 16(d) applies generally in all criminal cases, whereas § 1835 applies only to cases charging economic espionage, under 18 U.S.C. § 1831, and trade secret misappropriation, under 18 U.S.C. § 1832. Nonetheless, it is common for both legal bases, § 1835 and Rule 16(d), to be cited in an application for a protective order. In some cases, prosecutors may consider whether to charge the misappropriation of proprietary information as trade secret misappropriation or under other legal theories. See generally Section G. of this Chapter (considering other alternative charges). Where trade secrets are involved, however, it is recommended that prosecutors pursue charges under either §§ 1831 or 1832 of the EEA. One benefit from charging violations of the EEA is the ability to use the protections afforded in § 1835 to safeguard trade secrets in the criminal prosecution, such as the ability to seek an interlocutory appeal of a court order to disclose a trade secret, as noted in the next Section. 2. Interlocutory Appeals Section 1835 expressly allows the government to file “[a]n interlocutory appeal … from a decision or order of a district court authorizing or directing the disclosure of any trade secret.” This opportunity for prompt judicial review of a district court decision provides an essential added layer of protection against the disclosure of trade secrets. Although the language permitting the government to seek interlocutory appeal is broad and without time limits, as a practical matter, the issues concerning court-ordered disclosure of a trade secret should be raised before trial and certainly resolved before jeopardy attaches upon the swearing of the jury. Since the statute was enacted in 1996, the interlocutory provision has been invoked in two cases, United States v. Hsu, 155 F.3d 189 (3rd Cir. 1998), and United States v. Ye, 436 F.3d 1117 (9th Cir. 2006). Both times the government prevailed on appeal and averted disclosure of trade secret information, however, for different reasons. IV.Theft of Commercial Trade Secrets 207 United States v. Hsu (3d Cir. 1998) The first case to address the use of protective orders under the EEA is United States v. Hsu, 155 F.3d 189 (3rd Cir. 1998). Hsu, also one of the first cases prosecuted under the statute, presented an early test concerning the disclosure of trade secret information and the new protections provided under § 1835. In Hsu, the trade secrets involved processes, methods, and formulas for an anti-cancer drug known as Taxol. One defendant requested and offered to pay for Taxol information, not realizing he was communicating with an undercover agent. After the investigation, three defendants were charged with attempted theft of trade secrets, and a conspiracy to steal trade secrets, along with other charges. The defense moved for a copy of the documents revealed at a key meeting with the undercover agent. The government requested a protective order under § 1835 and Rule 16(d)(1) to prevent disclosure of the trade secrets. The government asked the court to review the materials in camera and to redact trade secret information. The government argued that since inchoate crimes of attempt and conspiracy were charged, there was no need to divulge the trade secrets. The defense insisted on receiving unredacted copies. The district court agreed with the defense to adopt an order allowing “select members of the defense team” with access to the documents. The court then “‘encourage[d]’ the government to file an interlocutory appeal to clarify the ‘unsettled and important questions of law’ raised by this case.” Hsu, 155 F.3d at 193-94 (quoting district court opinion). The government filed an interlocutory appeal under § 1835. On appeal, the Third Circuit reversed the district court ruling after concluding that the incomplete crimes of attempt and conspiracy did not require actual proof of the trade secret. Hsu, 155 F.3d at 203-04; see also Section B.6. of this Chapter, supra. After the case was remanded, the district court concluded the defense was not entitled to receive the unredacted documents. The materials were also unnecessary to support an entrapment or outrageous government conduct defense. See United States v. Hsu, 185 F.R.D. 192, 198 & n.19 (E.D. Pa. 1999) (analogizing that it is unnecessary in a drug case involving attempt or conspiracy charges for the defense to have access to the drugs in the case). Although the Hsu case did not involve review of a trade secret case involving actual misappropriation under the substantive provisions of the statute, 18 U.S.C. § 1832(a)(1)-(a)(3), the case demonstrates how the interlocutory appeal 208 Prosecuting Intellectual Property Crimes provision was used effectively to advert disclosure of trade secret information pending appellate court review. United States v. Ye (9th Cir. 2006) In United States v. Ye, 436 F.3d 1117 (9th Cir. 2006), the second case to address interlocutory appeal, decided eight years after Hsu, the government sought an interlocutory appeal along with a writ of mandamus. In Ye, two defendants were arrested as they tried to board a flight from San Francisco to China. They were found to possess suspected trade secrets from four Silicon Valley companies including technical schematics, information about design methodology, computer aided design scripts, microprocessor specifications, and other technology information. The two defendants were charged with committing economic espionage, the second case charging violations of § 1831, along with trade secret misappropriation and other counts. Before trial, the government provided the defense with “all the trade secret materials” under a protective order, including “more than 8,800 pages of materials, which ‘describe the substance of each alleged trade secret.’” Ye, 436 F.3d at 1119. The defense requested, and was granted, the opportunity to conduct pre-trial depositions of several government expert witnesses to determine “what exactly is being alleged to be the trade secret and why it is a trade secret in advance of trial.” Id. After its motion for reconsideration was denied, the government filed an interlocutory appeal under § 1835 and alternatively petitioned for a writ of mandamus under the All Writs Act, 28 U.S.C. § 1651. The Ninth Circuit concluded that it lacked jurisdiction over the § 1835 interlocutory appeal because “the purpose of the district court’s order was only to clarify exactly which materials the government contends constitute the protected trade secrets, and all relevant materials had already been turned over, the district court’s order does not direct or authorize the ‘disclosure’ of trade secrets as required by the plain language of § 1835.” Ye, 436 F.3d at 1121. In considering the second basis for appellate review, however, the court found that the government established “exceptional circumstances” to warrant a writ of mandamus directing the district court to rescind its ruling. As the court explained: After weighing all five [writ of mandamus] factors, we conclude that they lean strongly in favor of granting mandamus relief. The district court’s order was ‘wholly unauthorized’ and ‘constitutes a clear and very substantial departure from the fundamental IV.Theft of Commercial Trade Secrets 209 principles governing criminal pretrial and trial procedures in federal court.’ The government has demonstrated that it has no alternative means of relief and will suffer harm that is not correctable on appeal. Finally, the district court’s order raises the new and important question of whether the EEA empowers a court to authorize discovery depositions under Rule 15 in order to ensure fairness and efficiency and effectively control the dissemination of important trade secrets. Ye, 436 F.3d at 1124 (citations omitted). Consequently, the government prevailed in challenging the district court’s discovery order under this alternative, although exceptional, ground. 3. Types of Protective Orders Generally speaking, three types of protective orders may be appropriate during different stages of a case: • • • First, a protective order may be necessary to discuss the case with third parties before charges are filed. Under these circumstances, the protective order, which is typically stipulated to by the parties, should stipulate to jurisdiction in the event any disputes arise. Second, after charges are filed, but before any trial, a protective order is essential to ensure that the trade secret is used solely for preparation of the defense and is not divulged to third parties unconnected with the defense. Third, a protective order may be required to govern the use of trade secret evidence during a public trial. Typically, the parties will enter into a stipulation and application for entry of a protective order. Where agreement cannot be reached on selected issues, the court may need to resolve them. It is not uncommon for an interim protective order to be imposed during one stage with the understanding that it may be modified to protect the trade secret and related information at another stage. Protective orders may also vary depending on the issues in the case. For example, a special protective order may be necessary for a case involving source code. CCIPS has examples of each type of protective order which is available to prosecutors. These model protective orders can be tailored to the facts and issues of the particular case. 210 Prosecuting Intellectual Property Crimes As described in the following subsections, although protective orders may vary depending on the trade secrets and issues involved in the case, there are some key and consistent parameters that should be addressed in an application for each type protective order. The protections are different before trial and during trial. a. Pre-Trial Protective Order Issues Before trial, protective orders generally govern what information is covered and who may access it without necessarily stipulating that the information is in fact a trade secret. Because the defense may not wish to stipulate that the items are in fact trade secrets, it is not uncommon for the parties to agree that the designated items may constitute trade secrets or other confidential or proprietary information, or that the designation merely serves to “to preserve the confidentiality of trade secrets,” as required under 18 U.S.C. § 1835. At this stage of the criminal case, the label assigned to the materials is less important than ensuring that they are adequately safeguarded. The pre-trial protective order will typically restrict access to the defense litigation team solely for defending the case. One important feature of protective orders is that anyone accessing the trade secret materials sign an acknowledgment that they have read and understood the protective order and agree to be bound by its terms, including sanctions for any violations. The signed acknowledgments can be maintained by the government or filed with the court. The protective order usually specifies that: • the trade secret materials must be maintained in a secure manner and may not leave a designated area; • if maintained on a computer, the computer may not be connected to the Internet; • a copy of the protective order shall be kept with the copies of the protected materials at all times; • any filings of the trade secret materials shall be made filed under seal; and • the circumstances for the return of the trade secret materials upon the conclusion of the case. Another pretrial issue that may relate to a trade secret protective order concerns defense use of a subpoena under Fed. R. Crim. P. 17(c) to obtain further information about the trade secrets from the victim company. Prosecutors should consider whether the subpoena seeks information protected IV.Theft of Commercial Trade Secrets 211 by the protective order, or that has been previously provided. The courts have also recognized that Rule 17(c) cannot be used as a means to obtain general discovery. See, e.g., United States v. Hardy, 224 F.3d 752, 756 (8th Cir. 2000) (denying Rule 17(c) subpoena where defendant was attempting to use it as a discovery device, “which it is not”); United States v. Arditti, 955 F.2d 331, 345 (5th Cir. 1992) (Rule 17 “is not intended to provide an additional means of discovery”); see also United States v. Ye, 436 F.3d 1117, 1124 (9th Cir. 2006) (issuing writ of mandamus to rescind district court order compelling depositions of government expert witnesses concerning trade secrets before trial). Generally, Rule 17(c) subpoenas should not be issued by the court unless the moving party meets its burden to demonstrate that (1) the documents sought are both evidentiary and relevant, that is, admissible; (2) the documents are not otherwise procurable before trial through reasonable diligence, (3) the party cannot properly prepare for trial without early production; and (4) the application is not intended as a general fishing expedition. United States v. Nixon, 418 U.S. 683, 699-700 (1974). CCIPS can provide some sample responses to defense requests for subpoenas under Rule 17(c). b. Trial Protective Order Issues Separate issues are involved by the presentation of evidence related to the trade secret at trial. A protective order governing the use of information during trial may apply more specifically to “trade secrets” as defined under 18 U.S.C. § 1839(3), and “trial protected material,” which includes trade secret information and related confidential or proprietary information that may reveal or disclose the trade secrets in this case. The scope of this coverage protects against disclosure of not only trade secrets but information related to the trade secret. The protective order should impose a duty on the parties to notify the court before introducing any protected material at trial. This obligation is important to allow the court and parties to put appropriate and timely measures in place to protect the confidentiality of trade secrets before such material is introduced at trial. Likewise, prosecutors should consider seeking to include instructions on how trade secret materials may be presented during the trial. For example, the protective order could limit access to exhibit binders exclusively to the jury, the parties, and the court and require the exhibits to be retrieved after the conclusion of the witness testimony. Additionally, the court display or other 212 Prosecuting Intellectual Property Crimes monitors shall be similarly confined. See, e.g., United States v. Roberts, 2010 WL 1010000, at *9 (E.D. Tenn. Mar. 17, 2010). Special instructions may be necessary for witnesses and juries as well to protect trade secret material. For example, the parties may instruct witnesses not to disclose the protected materials during the course of their testimony until and unless authorized by the court. Additionally, during the trial and at the conclusion of the case, the jury may be instructed that they are not to disclose or otherwise use the protected material which was presented during the trial. CCIPS has sample trial protective orders for prosecutors. c. Closing the Courtroom Where closed proceedings are contemplated, other special requirements apply. First, Department of Justice policy does not permit the closing of the courtroom unless approved by the Deputy Attorney General. See 28 C.F.R. § 50.9; USAM 9-5.150. This presumption against closed proceedings may be overcome upon a showing of certain factors and approval by the Deputy Attorney General. A request for a closed proceeding is initially reviewed through the Office of Enforcement Operations at (202) 305-4023. Id.. For a trial example in which the courtroom was closed on a limited number of occasions, see United States v. Aleynikov, 2010 WL 5158125, at *1 (S.D.N.Y. Dec. 14, 2010) (noting “Over the course of the eight day trial, the courtroom was closed on seven occasions, most of them lasting no longer than 20 minutes.”), rev’d on other grounds, 676 F.3d 71 (2d Cir. 2012). The right to a public criminal trial, under the Sixth and First Amendments, is not absolute and may be limited in certain circumstances. See Globe Newspaper Co. v. Superior Court for the County of Norfolk, 457 U.S. 596, 603 (1982) (noting “the press and general public have a constitutional right of access to criminal trials.”); Waller v. Georgia, 467 U.S. 39, 46 (1984) (“[T]here can be little doubt that the explicit Sixth Amendment right of the accused is no less protective of a public trial than the implicit First Amendment right of the press and public.”); see also Gannett v. DePasquale, 443 U.S. 368, 419-33 (1979) (Blackmun, J., concurring in part and dissenting in part) (tracing the history of the right to a public trial and citing cases where that right has been limited). Although not absolute, the Supreme Court has held that, “proceedings cannot be closed unless specific, on the record findings are made demonstrating that ‘closure is essential to preserve higher values, and is narrowly tailored to serve that interest.’” Press-Enterprise Co. v. Superior Court of California for IV.Theft of Commercial Trade Secrets 213 Riverside, 478 U.S. 1, 13-14 (1986) (citations omitted) (holding there is a First Amendment right of access to the transcript of a preliminary hearing); Waller, 467 U.S. at 48 (noting that (i) a “party seeking to close the hearing must advance an overriding interest that is likely to be prejudiced,” (ii) “the closure must be no broader than necessary to protect that interest,” and (iii) “the trial court must consider reasonable alternatives to closing the proceeding”); see also In re Copley Press, Inc., 518 F.3d 1022, 1028 (9th Cir. 2008) (applying factors, concluding there was “no First Amendment right to access the transcripts of the closed portions of the [plea] hearings on the motions to seal”). Accordingly, if the proceedings are closed, appropriate findings, consistent with this case law, should be made on the record. 4. Return of Trade Secrets Upon Conclusion of the Case A final step to safeguard trade secrets is to provide for the return of the trade secret material upon the conclusion of the case. The protective order should direct that the defense assemble and return all materials and certify in writing that the required procedures were completed. To ensure defense counsel is aware of the responsibility to return all trade secret material after a conviction, by trial or plea agreement, the prosecutor should alert the defense and court that the materials will be requested for return shortly after sentencing. One approach used in trade secret cases is to send defense counsel a letter reminding them of the terms under the protective order requiring the return of the trade secret materials upon the conclusion of the case. The letter can request the material be returned at the sentencing hearing or shortly afterwards. The sentencing memorandum can apprise the court of this request which can be renewed at the sentencing hearing. The court can resolve any disagreements under the terms of the protective order. E. Special Issues 1. Civil Injunctive Relief for the United States The EEA authorizes the government to file a civil action to “obtain appropriate injunctive relief against any violation of this chapter.” See 18 U.S.C. § 1836(a). Prosecutors should consider seeking injunctive relief to prevent further disclosure of a trade secret by the defendant or third parties during a criminal investigation, or as part of the judgment at the end of the case. 214 Prosecuting Intellectual Property Crimes Prosecutors may even seek injunctive relief in matters that do not warrant criminal prosecution if the victim is unable to do so. Note, however, that most victims can obtain injunctive and monetary relief on their own through state-law statutory and common-law remedies. For an extensive discussion of injunctive relief in civil cases, see 4 Roger M. Milgrim, Milgrim on Trade Secrets § 15.02[1]. The civil remedy in § 1836 can be enforced only by the government. Neither that section nor any other section of the EEA creates a private right of action that can be enforced by private citizens. Cooper Square Realty, Inc. v. Jensen, No. 04 Civ. 01011 (CSH), 2005 WL 53284 (S.D.N.Y. Jan. 10, 2005); Barnes v. J.C. Penney Co., No. 3-04-CV-577-N, 2004 WL 1944048 (N.D. Tex. Aug. 31, 2004), magistrate’s findings adopted, 2004 WL 2124062 (N.D. Tex. Sept. 22, 2004). 2. Parallel Proceedings In light of the significant overlap of elements in civil trade secret misappropriation statutes and the EEA, it is often the case that a prosecutor on an EEA criminal case is confronted with a parallel civil proceeding. A parallel proceeding is simply simultaneous or successive investigation or litigation of separate criminal, civil, and administrative actions by different agencies, different branches of government, or private litigants involving a common set of facts. Office of Legal Education, U.S. Dep’t of Justice, Federal Grand Jury Practice § 12.1 (2008). In the context of an EEA prosecution, a parallel proceeding is most likely to arise in the form of a concurrent or pre-existing civil trade secret misappropriation case brought by the victim against one or more of the subjects of the criminal investigation. Additionally, as explained above, § 1836(a) of the statue expressly authorizes the Attorney General to bring a civil action to “obtain appropriate injunctive relief against any violation of this chapter.” These parallel civil proceedings will almost certainly generate evidence, in the form of interrogatory responses, deposition or trial testimony, and responses to document requests that would be of interest to a criminal prosecutor and investigator investigating potential criminal violations of the EEA. And in some cases, a victim / civil plaintiff may be more than willing to turn over this IV.Theft of Commercial Trade Secrets 215 evidence to law enforcement. However, federal prosecutors need to be mindful of both the strategic and ethical implications of parallel proceedings in an EEA prosecution. Prosecutors looking for more in depth guidance on parallel proceedings across all types of federal criminal prosecutions should consult the Federal Grand Jury Practice Manual. a. Due Process and Prosecutorial Misconduct Considerations There is nothing inherently wrong, ethically or legally, with parallel proceedings, provided that each proceeding is conducted in good faith. See, e.g., United States v. Kordel, 397 U.S. 1 (1970) (approving government’s parallel civil and criminal proceedings against defendant); Abel v. United States, 362 U.S. 217 (1960) (lacking bad faith, mere cooperation of different branches of the Department of Justice is neither illegitimate or unconstitutional); Securities & Exchange Comm’n v. Dresser Indus., 628 F.2d 1368, 1374 (D.C. Cir. 1980) (en banc) (“In the absence of substantial prejudice to the rights of the parties involved, such parallel proceedings are unobjectionable under [United States] jurisprudence.”). Misuse of a civil or criminal proceeding for the purpose of benefitting the other proceeding, however, in addition to being improper, may jeopardize the criminal proceeding. Such misuse may include affirmative misstatements of fact or law, conduct involving dishonesty, fraud, deceit, or misrepresentation, or impermissible communications with represented persons. Professional responsibility questions with regard to a specific factual scenario should be directed to the Department of Justice’s Professional Responsibility Advisory Office at (202)514-0458. As discussed below, three circuits have recently found, on somewhat similar factual records, that parallel civil and criminal proceedings being handled by separate divisions of the U.S. government were not conducted in bad faith, and therefore did not violate due process. The key similarities in those cases were that: (1) there were legitimate bases for the civil actions; (2) the defendants were advised of their Fifth Amendment rights prior to making statements to government questioners in the civil actions; and (3) no misleading statements were made regarding the pendency of any criminal proceedings. But see United States v. Scrushy, 366 F. Supp. 2d 1134 (N.D. Ala. 2005) (suppressing testimony given by defendant at deposition in civil action by the Security and Exchange Commission (SEC) where the SEC scheduled the deposition based on the prosecutor’s request, and the prosecutor provided topics for the SEC to cover). 216 Prosecuting Intellectual Property Crimes In United States v. Stringer, 535 F.3d 929 (9th Cir. 2008) the Ninth Circuit considered the conduct of a parallel civil SEC investigation, which led to a criminal referral and prosecution by the U.S. Attorney’s Office in Oregon. At the outset of the SEC’s investigation, the agency provided a standard letter to the defendants, informing them that it may turn over evidence to criminal investigators. The SEC also advised witnesses of their Fifth Amendment Rights at the beginning of their depositions. The SEC referred the matter for criminal prosecution to the U.S. Attorney’s Office early in its case, and provided evidence to the criminal prosecution team during the course of its case. It also scheduled depositions of subjects of the criminal investigation to be held in the jurisdiction of the investigating U.S. Attorney’s Office, at the request of the Assistant U.S. Attorney. The district court granted defendant’s motion to dismiss the indictment in which the defendant argued that the government used deceit and trickery to obtain incriminating evidence and statements in the civil proceeding for the criminal proceeding, in violation of Due Process. The Ninth Circuit reversed the district court decision. Central to the Ninth Circuit’s ruling were that the SEC made no affirmative misrepresentations and advised defendants of possible criminal referrals at the outset of the civil proceeding. The court further recognized: It is significant to our analysis that the SEC began its civil investigation first and brought in the U.S. Attorney later. This tends to negate any likelihood that the government began the civil investigation in bad faith, as, for example, in order to obtain evidence for a criminal prosecution. Id. at 939. The Eleventh Circuit reached the same conclusion on similar facts in United States v. Moses, 219 Fed. Appx. 847 (11th Cir. 2007), in which a defendant in a criminal securities fraud prosecution argued, unsuccessfully, that the government engaged in prosecutorial misconduct when the SEC deposed him in its civil proceeding shortly before the U.S. Attorney’s Office initiated its criminal case. As in Stringer, the Eleventh Circuit found that the SEC had a legitimate purpose in pursuing its civil case, and the defendant was advised of his Fifth Amendment rights prior to his deposition. Id. at 849-50. In reaching its ruling, the court noted that “[i]t is well established that the federal IV.Theft of Commercial Trade Secrets 217 government may pursue civil and criminal actions either ‘simultaneously or successively.’” Id. at 849. Similarly, in United States v. Posada Carilles, 541 F.3d 344 (5th Cir. 2008), the Fifth Circuit Court of Appeals reversed the district court’s dismissal of a false statements indictment arising out of the defendant’s statements during a naturalization interview. There, the defendant, a high-profile Cuban dissident who had been linked to a terrorist attack decades earlier, had illegally entered the United States and applied for citizenship after he was detained. The immigration officer met with federal prosecutors when preparing for the naturalization interview. At the beginning of the interview, the immigration officer advised the defendant of his Fifth Amendment rights, which the defendant invoked at various times during the interview. Reversing the district court’s dismissal of the indictment, the Fifth Circuit held that the immigration officer did not have an affirmative duty to warn the defendant of the possibility of criminal prosecution, provided that she did not make any material misrepresentations. The court concluded: “the mere failure of a government official to warn that an investigation may result in criminal charges does not constitute fraud deceit, or trickery.” Id. at 355. Also key to the court’s ruling were the facts that the defendant, and not the government, initiated the civil proceeding in which he made the false statements while applying for citizenship; the defendant was advised of his Fifth Amendment rights; and the U.S. Citizenship and Immigration Services, like the SEC, is required by law to coordinate with federal law enforcement. It remains to be seen how a court would address similar types of interaction between prosecutors and private parties who were pursuing a civil trade secret action against the subjects of a criminal investigation. For example, it is uncertain how a court would address a situation where the private litigant met with prosecutors to prepare for depositions of subjects of the criminal investigation, and asked subjects questions proposed by prosecutors. The Stringer, Posada Carilles, and Moses cases suggest that a court would not find a due process violation or prosecutorial misconduct, provided that the civil litigation was for a legitimate, independent purposes, and no material, misleading statements were made regarding the possibility of criminal prosecution. b. Strategic Considerations Apart from the ethical considerations outlined above, the potential for parallel proceedings raises other strategic considerations in EEA prosecutions. 218 Prosecuting Intellectual Property Crimes While evidence gathered by a trade secret owner in a civil action may assist in developing a criminal case, there is also the potential such evidence may be damaging to a criminal investigation. For example, defendants in civil trade secret proceedings are entitled to liberal discovery, which they use to poke holes in both the secrecy of the alleged trade secret information and in the security measures employed by the victim. Defendants may pursue extensive third-party discovery designed to show that the allegedly secret information is, in fact, known to a variety of entities. Similarly, depositions of employees of the owner of the alleged trade secret information could result in conflicting testimony on what they understand to be secret and not secret. Aggressive discovery could also be employed in an attempt to harass employees of the victim company. In such circumstances, the government may consider bringing a motion to stay the parallel civil proceeding. See generally Federal Grand Jury Practice, § 12.9 (discussing motions to stay in detail). Of course, doing so will require making the pending criminal investigation known to its subjects. 3. Significance of Electronic Evidence in Trade Secret and Economic Espionage Act Cases Electronic evidence has proven particularly significant in recent trade secret and economic espionage cases. Because there are unique challenges in gathering evidence concerning a scheme to misappropriate trade secrets, and some of the evidence may be in a foreign country, electronic evidence may open a window on the unlawful conduct. a. Examples of Electronic Evidence Examples of electronic evidence in a trade secret case include: • • • • • • email or other communications on the victim company’s servers that may demonstrate the misappropriation; email or other communications or records obtained during a border search of a laptop either entering or leaving the country; records on storage media, such as a thumb drive, or portable hard drive used to transfer or download trade secrets; email or other communication records among the targets or coconspirators planning the misappropriation or discussing venture capital or business formation to use the trade secret; cell phone communications and records; records obtained after seizing computers or hard drives of targets under investigation. IV.Theft of Commercial Trade Secrets 219 In addition to supporting trade secret or economic espionage charges, electronic evidence may also illuminate other legal theories that may apply in the case, such as wire or computer fraud. b. Developing an Electronic Evidence Case Plan Given the importance of electronic evidence, it is important to develop an Electronic Evidence Case Plan at the inception of the case. As part of the plan, consider what types of electronic evidence may be involved. Also, consider how many places the evidence may be found. For example, an email may be located on the sender and recipient’s computer or provider’s server. In such circumstances, investigators and prosecutors should consider issuing a request to preserve electronic evidence pending further legal process. Title 18, United States Code, § 2703(f )(1) provides: A provider of wire or electronic communication services or a remote computing service, upon the request of a governmental entity, shall take all necessary steps to preserve records and other evidence in its possession pending the issuance of a court order or other process. Under Section 2703(f )(2), the provider must retain the records, pending legal process, “for a period of 90 days, which shall be extended for an additional 90-day period upon a renewed request by the governmental entity.” For more detailed information on preserving and obtaining electronic evidence see CCIPS’s manual on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. c. Case Example: United States v. Meng The importance of an Electronic Evidence Case Plan was underscored in United States v. Meng, No. CR 5:04-20216-JF (N.D. Cal. Aug. 29, 2007), a case involving economic espionage charges under 18 U.S.C. § 1831, trade secret misappropriation under 18 U.S.C. § 1832, violations of the Arms Export Control Act under 22 U.S.C. § 2778, and other related charges. The defendant was suspected of misappropriating trade secrets from a Silicon Valley company and using them in the People’s Republic of China. During a threeday visit to attend a conference in the United States, the defendant was arrested based on preliminary evidence found during a border search of the defendant’s laptop. Section 2703(f ) preservation requests were made for all identified 220 Prosecuting Intellectual Property Crimes email accounts shortly after the arrest was made. After an initial indictment was obtained, a search warrant for the known email accounts was issued about thirty days after the arrest and after preservation requests were made. . After receiving the search warrant, one email provider advised that there were about 980 emails in the account. The email provider noted that someone using IP addresses in another country tried to delete approximately 966 emails, during a time after the arrest was made in the case. See also Meng, No. CR 0420216-JF (N.D. Cal. Dec. 13, 2006) at ¶ 37 (Superseding Indictment alleging: “It was further part of the conspiracy that defendant Xiaodong Sheldon Meng, directed, and caused to be directed, another person unknown to the Grand Jury, to delete approximately nine-hundred sixty-six (966) emails from Defendant Xiaodong Sheldon Meng’s account at smeng~cn@yahoo.com.cn.”). Because a preservation request had been made at the time of the arrest, the later attempt to delete the emails was ineffective and the government was able to obtain all of the contents. Without the preservation request, important evidence used to further the investigation and support the prosecution would not have been available in the case. Ultimately, the defendant pled guilty to violating § 1831 of the Economic Espionage Act and also the Arms Export Control Act. See United States v. Meng, No. CR 5:04-20216-JF (N.D. Cal. Aug. 29, 2007). 4. Extraterritoriality Federal criminal laws are generally presumed not to apply to conduct outside the United States or its territories unless Congress indicates otherwise. See, e.g., United States v. Corey, 232 F.3d 1166, 1170 (9th Cir. 2000). Congress made an exception for the EEA. The EEA expressly “applies to conduct outside the United States if—(1) the offender is a citizen or permanent resident alien of the United States, or an organization organized under the laws of the United States or a State or political subdivision thereof; or (2) an act in furtherance of the offense was committed in the United States.” 18 U.S.C. § 1837. 5. Department of Justice Oversight Before Congress passed the EEA, the Attorney General promised that all EEA prosecutions under both §§ 1831 and 1832 would be approved by the Attorney General, the Deputy Attorney General, or the Assistant Attorney General of the Criminal Division during the first five years of the from the date the statute was enacted. This requirement was codified at 28 C.F.R. § 0.64-5 and applied to the filing of complaints, indictments, and civil proceedings, but not to search warrant applications or other investigative measures. IV.Theft of Commercial Trade Secrets 221 After the five-year period elapsed, the approval process was modified. Federal prosecutors may now prosecute 18 U.S.C. § 1832 offenses without prior approval; however, the Attorney General strongly urges consultation with the Computer Crime and Intellectual Property Section (CCIPS) before filing § 1832 charges because of CCIPS’s experience in handling these complex cases and its access to valuable information and resources. CCIPS can be reached at (202) 514-1026. CCIPS regularly provides assistance on EEA cases including (1) indictment review; (2) suggestions on proving an intent to benefit a foreign government (a key offense element) under 18 U.S.C. §§ 1831, 1839(1), (2); (3) addressing proof issues in establishing a “trade secret” under 18 U.S.C. §§ 1832, 1839(3); (4) early issue spotting and investigative steps to consider; (5) identifying case strategies and suggesting alternative charging theories; (6) advising on strategies to develop an Electronic Evidence Case Plan to obtain electronic evidence; (7) providing sample pleadings, protective orders, and other documents; and (8) trial and proof issues. In contrast, the Attorney General renewed the prior approval requirement for initiating prosecutions under 18 U.S.C. § 1831. Approval must be obtained from the Assistant Attorney General for the National Security Division, through the Counterespionage Section. USAM 9-2.400, 9-59.000. The Counterespionage Section can be reached at (202) 233-0986. F. Penalties 1. Statutory Penalties a. Imprisonment and Fines Reflecting the more serious nature of economic espionage sponsored by a foreign government, the maximum sentence for a defendant convicted under 18 U.S.C. § 1831 is 15 years’ imprisonment and a fine of $5 million, whereas the maximum sentence for a defendant convicted under 18 U.S.C. § 1832 is 10 years’ imprisonment and a fine of $250,000 or twice the monetary gain or loss, or both. See 18 U.S.C. §§ 1831(a), 1832(a). Similarly, organizations can be fined up to $10 million for violating § 1831 or $5 million for violating § 1832. 18 U.S.C. §§ 1831(b), 1832(b). 222 Prosecuting Intellectual Property Crimes b. Criminal Forfeiture The EEA provides for both civil and criminal forfeiture. In October 2008, Congress harmonized the criminal forfeiture provisions for all criminal intellectual property violations, including violations of the EEA, in the Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008. The relevant provision is 18 U.S.C. § 2323. Section 1834 of the EEA, which formerly governed criminal forfeiture for violations of the EEA now simply references 18 U.S.C. § 2323. The following property is subject to both criminal and civil forfeiture in a case brought under the EEA: (A) Any article, the making or trafficking of which, is prohibited under ... [the EEA]. (B) Any property used, or intended to be used, in any manner or part to commit or facilitate the commission of [a violation of the EEA]. (C) Any property constituting or derived from any proceeds obtained directly or indirectly as a result of the commission of [a violation of the EEA]. 18 U.S.C. § 2323(a)(1), (b)(1). As a procedural matter, the government should allege forfeiture in the indictment. For additional discussion of forfeiture in intellectual property cases, see Chapter VIII of this Manual. c. Restitution The PRO-IP Act of 2008 referenced above also harmonized federal criminal law regarding restitution in intellectual property offenses in a single section of the criminal code, 18 U.S.C. § 2323(c). That section now expressly provides that the court shall order a person who has been convicted of an EEA offense, among other criminal intellectual property laws, “to pay restitution to any victim of the offense as an offense against property referred to in 18 U.S.C. § 3663A(c)(1)(A)(ii).” The Mandatory Victims Restitution Act of 1996 (“MVRA”), codified at 18 U.S.C. § 3663A, requires the court to order restitution in all convictions for, among others, any “offense against property … including any offense IV.Theft of Commercial Trade Secrets 223 committed by fraud and deceit,” and “in which an identifiable victim or victims has suffered a physical injury or pecuniary loss.” See 18 U.S.C. § 3663A(c)(1) (A)(ii), (B). For cases involving “damage to or loss or destruction of property of a victim of the offense,” the MVRA requires that the defendant return the property to its owner. If return of the property is “impossible, impracticable, or inadequate,” the MVRA requires the defendant to pay an amount equal to the property’s value on the date of its damage, destruction, or loss, or its value at the time of sentencing, whichever is greater, less the value of any part of the property that is returned. See 18 U.S.C. § 3663A(b)(1). As noted, the mandatory restitution statute also applies to any offense where “an identifiable victim or victims has suffered a physical injury or a pecuniary loss.” 18 U.S.C. § 3663A(c)(1)(B). Restitution must be ordered “to each victim in the full amount of each victim’s losses as determined by the court and without consideration of the economic circumstances of the defendant.” 18 U.S.C. § 3664(f )(1)(A). Thus, to the extent a court has already calculated the loss or injury actually suffered by a victim of trade secret theft in determining the offense level under U.S.S.G. § 2B1.1, the same amount could be used for restitution under the MVRA. For additional discussion of restitution in criminal intellectual property cases, see Chapter VIII of this Manual. 2. Sentencing Guidelines Issues concerning the Sentencing Guidelines are covered in Chapter VIII of this Manual. G. Other Charges to Consider When confronted with a case that implicates confidential proprietary information, prosecutors may wish to consider other crimes in addition to or in lieu of EEA charges. Section 1838 of the statute contemplates that other appropriate remedies may be considered, as the statute does not “preempt or displace any other remedies, whether civil or criminal, provided by United States Federal, State, commonwealth, possession, or territory law for the misappropriation of a trade secret.” Other charges that may be appropriate, depending on the fact of the case, may include: • 224 Disclosing government trade secrets, 18 U.S.C. § 1905, which punishes government employees and contractors who, inter alia, “divulge” or “disclose” trade secrets or certain other information to Prosecuting Intellectual Property Crimes • the extent not authorized by law. United States v. Wallington, 889 F.2d 573 (5th Cir. 1989) (affirming defendant’s conviction for running background checks on several people whom the defendant’s friend suspected of dealing drugs). Defendants face a fine, a year in prison, and removal from office or employment. Congress clarified that Customs and Border Protection (CBP) may disclose to rights-holders information on suspected counterfeit products to determine if the product is prohibited from importation. See § 818(g) of the National Defense Authorization Act for FY2012 (NDAA), H.R.1540, Pub. L. No. 112-81, 125 Stat. 1298 (Dec. 31, 2011) (also noting that this provision will expire on the date the Customs Facilitation and Trade Enforcement Reauthorization Act of 2012 is enacted). Unlawfully accessing or attempting to access a protected computer to obtain information, 18 U.S.C. § 1030(a)(2), (b), for access to a computer used for interstate or foreign commerce or by or for a financial institution or the United States government, 18 U.S.C. § 1030(e)(2). The term “information” is to be construed broadly and need not be confidential or secret in nature. S. Rep. No. 104-357, at 7 (1996). “‘[O]btaining information’ includes merely reading it. There is no requirement that the information be copied or transported.” Id. A violation is a misdemeanor unless it was committed for commercial advantage or private financial gain, to further any tortious or criminal act, or if the information’s value exceeds $5,000. See 18 U.S.C. § 1030(c) (2). For offenses on or after September 26, 2008, § 1030(a)(2)(C) was amended (1) to remove the requirement that “the conduct involved an interstate or foreign communication” and (2) to broaden the definition of “protected computer” to include those used in or affecting interstate or foreign commerce or communication. See Former Vice President Protection Act, Pub. L. No. 110-326, 122 Stat. 3560 (2008). • Note: There presently is a split in the circuits in construing the terms “exceed[ing] authorized access” to information under the Computer Fraud and Abuse Act. Depending on the facts of the case, CCIPS can provide current guidance on this issue. Unlawfully accessing or attempting to access a protected computer to commit fraud, 18 U.S.C. § 1030(a)(4), (b), where the defendant “knowingly and with intent to defraud,” accessed or attempted to access IV.Theft of Commercial Trade Secrets 225 a protected computer without authorization, or in excess of authorized access, and by means of such conduct furthered the intended fraud and obtained anything of value, “unless the object of the fraud and the thing obtained” was computer time worth less than $5,000. What constitutes “fraud” under § 1030(a)(4) is defined broadly. See 132 Cong. Rec. 7,189 (1986) (“The acts of ‘fraud’ that we are addressing in proposed section 1030(a)(4) are essentially thefts in which someone uses a [protected computer] to wrongly obtain something of value from another”); see also Shurgard Storage Centers, Inc., v. Safeguard Self Storage, Inc. 119 F. Supp. 2d 1121, 1126 (W.D. Wash. 2000) (holding that the word “fraud” as used in § 1030(a)(4) simply means “wrongdoing” and does not require proof of the common-law elements of fraud). EEA charges, which generally involve some level of deception and knowing wrongdoing, will often qualify as fraud. Harming a victim’s “goodwill and reputation” provides a defendant with something of “value.” See, e.g., In re America Online, Inc., 168 F. Supp. 2d 1359, 1380 (S.D. Fla. 2001). For more information on offenses involving 18 U.S.C. § 1030 generally, see CCIPS’s manual Prosecuting Computer Crimes. • 226 Mail or wire fraud, 18 U.S.C. §§ 1341, 1343, 1346, for schemes that use the mail or wires to defraud another of property or confidential and proprietary information. See, e.g., United States v. Martin, 228 F.3d 1, 16-19 (1st Cir. 2000) (affirming mail and wire fraud convictions for schemes to obtain confidential business information); Howley, 2013 WL 399345, at *5 (affirming wire fraud convictions for taking and emailing photographs containing confidential proprietary information after promising to not take photographs in non-disclosure agreement). A scheme to defraud another of property includes intangible property, such as confidential, nonpublic, prepublication, and proprietary information. Carpenter v. United States, 484 U.S. 19 (1987) (holding that financial journalist’s trading on information gathered for his newspaper column defrauded the newspaper of its right to the exclusive use of the information); United States v. Wang, 898 F. Supp. 758, 760 (D. Colo. 1995) (holding that 18 U.S.C. § 1343 applies not just to physical goods, wares, or merchandise, but also to confidential computer files transmitted by wire); United States v. Seidlitz, 589 F.2d 152 (4th Cir. 1978) (holding that data the defendant downloaded from Prosecuting Intellectual Property Crimes his former employer’s computer system qualified as property under the wire fraud statute and a trade secret). Mail and wire fraud convictions stemming from the theft of trade secrets have been upheld even when charges under the National Transportation of Stolen Property Act (hereinafter “NTSP act”) were not applicable based on the facts of the case, 18 U.S.C. §§ 2314-15, see infra, were rejected. See, e.g., Abbott v. United States, 239 F.2d 310 (5th Cir. 1956) (affirming § 1341 conviction, but finding insufficient evidence to sustain conviction under 18 U.S.C. § 2314 because government failed to prove market value of map or how or who caused the map to be transported). The mail and wire fraud statute’s broader scope results from its concern for the theft of “property” generally, as compared to the NTSP Act’s focus on the arguably narrower class of “goods, wares and merchandise” used in §§ 2314 and 2315. See, e.g., Wang, 898 F. Supp. at 760 (holding that 18 U.S.C. § 1343 applies to items other than physical goods, wares, and merchandise). Note: In 2010, in a series of cases, Skilling v. United States, 130 S. Ct. 2896 (2010); Black v. United States, 130 S.Ct. 2963 (2010); and Weyhrauch v. United States, 130 S. Ct. 2971 (2010), the Supreme Court held that the honest services fraud statute, 18 U.S.C. § 1346, applies only to bribery and kickback schemes. For a more detailed discussion of 18 U.S.C. §§ 1341 and 1343, refer to USAM 9-43, and contact the Fraud Section of the Criminal Division at (202) 514-7023 for further information and guidance. • Criminal copyright infringement, 17 U.S.C. § 506 and 18 U.S.C. § 2319, when the defendant stole and reproduced or distributed copyrighted information. The Copyright Act does not preempt trade secret or related charges if the defendant stole confidential copyrighted material. See Wang, 898 F. Supp. at 760-61 (holding that Copyright Act did not preempt wire fraud prosecution for stealing confidential copyrighted material); Association of Am. Med. Colls. v. Princeton Review, Inc., 332 F. Supp. 2d 11, 22-24 (D.D.C. 2004) (analyzing issue and collecting cases). • Interstate transportation and receipt of stolen property or goods, the National Transportation of Stolen Property Act (hereinafter “NTSP Act”), which punishes “[w]hoever transports, transmits, or transfers in interstate or foreign commerce any goods, wares, merchandise, IV.Theft of Commercial Trade Secrets 227 securities or money, of the value of $5,000 or more, knowing the same to have been stolen, converted or taken by fraud,” 18 U.S.C. § 2314, and “[w]hoever receives, possesses, conceals, stores, barters, sells, or disposes” stolen property that has crossed a state or federal boundary after being stolen, 18 U.S.C. § 2315. Assuming that particular stolen items qualify as goods, wares, or merchandise, the courts agree that §§ 2314 and 2315 apply when a defendant steals a tangible object — for example, a piece of paper or a computer disk — that contains intellectual property. See, e.g., United States v. Martin, 228 F.3d 1, 14-15 (1st Cir. 2000); United States v. Walter, 43 M.J. 879, 884 (N.M. Ct. Crim. App. 1996) (“[C]ourts will include intangible property under the [NTSP] act when tied to tangible property and when the intangible property possesses some business value.”); United States v. Brown, 925 F.2d 1301, 1308 n.14 (10th Cir. 1991) (holding that even though § 2314 does not apply to theft of intangible property through intangible means, § 2314 would apply to the theft of a piece of paper bearing a chemical formula, even if the paper’s intrinsic value were insignificant and the item’s overall value was almost wholly derived from the intangible intellectual property contained in the chemical formula) (citing United States v. Stegora, 849 F.2d 291, 292 (8th Cir. 1988)) (dictum); United States v. Lyons, 992 F.2d 1029, 1033 (10th Cir. 1993) (holding that the defendant’s theft of “software in conjunction with the theft of tangible hardware distinguishes this case from Brown. Brown recognizes that the theft of intangible intellectual property in conjunction with the theft of tangible property falls within the ambit of § 2314.”); United States v. Lester, 282 F.2d 750 (3d Cir. 1960) (holding that originals and copies of geophysical maps made by defendants on the victim’s own copying equipment, with the victim’s own supplies, are covered under § 2314); United States v. Seagraves, 265 F.2d 876 (3d Cir. 1959) (facts similar to Lester); United States v. Greenwald, 479 F.2d 320 (6th Cir. 1973) (original documents containing trade secrets about fire retardation processes); cf. Hancock v. Decker, 379 F.2d 552, 553 (5th Cir. 1967) (holding that state conviction for theft of 59 copies of a computer program was supported by similar federal court rulings under § 2314) (citing Seagraves, 265 F.2d at 876). 228 Prosecuting Intellectual Property Crimes Courts are divided, however, on whether the NTSP Act applies to a defendant who transfers intangible property through intangible means, such as electronic data transmission or copying from one piece of paper to another. One view is that it does not. In Brown, the defendant was charged with transporting (by means unknown) the source code of a computer program from Georgia to New Mexico, but the government could not prove that the defendant had copied the source code onto the victim’s diskettes or that he possessed any of the victim’s tangible property. Brown, 925 F.2d at 1305-09. The Tenth Circuit held that 18 U.S.C. § 2314 did not cover “[p]urely intellectual property,” such as the source code appropriated by the defendant: “It can be represented physically, such as through writing on a page, but the underlying, intellectual property itself, remains intangible” and thus “cannot constitute goods, wares, merchandise, securities or moneys which have been stolen, converted or taken within the meaning of §§ 2314 or 2315.” Id. at 1307-08. In reaching its decision, the court relied on Dowling v. United States, 473 U.S. 207 (1985), which held that property that is “stolen” only in the sense that it is copyright infringing does not fall under the NTSP Act. However, the Brown court recognized that § 2314 may apply where the item is tangible: “for § 2314 to apply there must be some tangible item taken, however insignificant or valueless it may be, absent the intangible component.” Brown, 925 F.2d at 130708 n.14. The Tenth Circuit has noted this distinction in other cases. See, e.g., United States v. Lyons, 992 F.2d 1029, 1033 (10th Cir. 1993) (in a conviction for transporting stolen computer hardware, the value of the stolen computer software could be considered for sentencing notwithstanding Brown; “The fact that Mr. Lyons stole the software in conjunction with the theft of tangible hardware distinguishes this case from Brown.”), petition for reh’g denied, 997 F.2d 826 (10th Cir. 1993). More recently, the Second Circuit reversed a conviction based on the transmission of stolen source code because “the theft and subsequent interstate transmission of purely intangible property is beyond the scope of ” § 2314. United States v. Aleynikov, 676 F.3d 71, 77 (2d Cir. 2012). See also Section F. of Chapter II (discussing application of Dowling to charging 18 U.S.C. § 2314 for intellectual property crimes). Other cases have approved of NTSP Act prosecutions for theft of intangible property including by intangible means. See, e.g., United IV.Theft of Commercial Trade Secrets 229 States v. Alavi, No. CR07–429–PHX–NVW, 2008 WL 1971391 (D. Ariz. May 2, 2008) (denying motion to dismiss § 2314 count based on the claim that computer software is not “goods, wares, merchandise, securities or money”; distinguishing application of Dowling); United States v. Riggs, 739 F. Supp. 414, 420-21 (N.D. Ill. 1990) (Rejecting defendant’s “disingenuous argument that he merely transferred electronic impulses [albeit impulses containing computerized text files belonging to Bell South] across state lines.… This court sees no reason to hold differently simply because [defendant] stored the information inside computers instead of printing it out on paper. In either case, the information is in a transferrable, accessible, even salable form.”) 230 • Arms Export Control Act, 22 U.S.C. §§ 2778, and the International Traffic in Arms Regulations (ITAR), 22 C.F.R. §§ 120-130, which prohibits the export or import of U.S. Munitions List items without obtaining a license from the Secretary of State. See, e.g., United States v. Reyes, 270 F.3d 1158, 1169 (7th Cir. 2001) (“Conviction on this count required that the government prove beyond a reasonable doubt that Reyes willfully exported or attempted to export an item on the United States Munitions List without having first obtained a license.”). “Defense article” includes items or technical data designated on the United States Munitions List, and “technical data recorded or stored in any physical form, models, mockups, or other items that reveal technical data directly relating to items designated [in the Munitions List].” 22 C.F.R. § 120.6. Under USAM 9-90.620 Arms Export Control Act—22 U.S.C. § 2778, “[u]nless the unlicensed shipment has no relevance to the foreign relations of the United States (e.g., smuggling small quantities of weapons), prosecution of violations of the Arms Export Control Act should not be undertaken without prior approval of the National Security Division. In United States v. Meng, No. CR 04-20216-JF (N.D. Cal. Aug. 29, 2007) the defendant was convicted under both the Arms Export Control Act and § 1831 of the Economic Espionage Act. • False Statement, under 18 U.S.C. § 1001, may apply where the defendant makes a material false statement to an agent during the investigation. A statement is material under § 1001 if it has a “natural tendency to influence, or [be] capable of influencing, the decision of the decisionmaking body to which it was addressed.” United States v. Prosecuting Intellectual Property Crimes Gaudin, 515 U.S. 506, 509 (1995). See generally Chung, 659 F.3d at 830 (in EEA prosecution, finding sufficient evidence at trial to support false statement conviction based on the defendant’s false statement that “his boss ... had given him permission to take work documents home”). • State and local charges. Many states have laws that specifically address the theft of information. See, e.g., Uniform Trade Secrets Act. If a state lacks a specific trade-secret law, its general theft statutes may apply. Section 1838 of the EEA contains a non-preemption provision which expressly recognizes that other federal and state remedies may apply “for the misappropriation of a trade secret.” IV.Theft of Commercial Trade Secrets 231 232 Prosecuting Intellectual Property Crimes V. Digital Millennium Copyright Act— 17 U.S.C. §§ 1201-1205 A. Introduction 1. DMCA’s Background and Purpose With the advent of digital media and the Internet as a means to distribute such media, large-scale digital copying and distribution of copyrighted material became easy and inexpensive. In response to this development, and to prevent large-scale piracy of digital content over the Internet, in 1997 the World Intellectual Property Organization (WIPO) responded with two treaties, the Copyright Treaty and the Performances and Phonograms Treaty, to prohibit pirates from defeating the digital locks that copyright owners use to protect their digital content from unauthorized access or copying. Specifically, Article 11 of the WIPO Copyright Treaty prescribes that contracting states shall provide adequate legal protection and effective legal remedies against the circumvention of effective technological measures that are used by authors in connection with the exercise of their rights under this Treaty or the Berne Convention and that restricts acts, in respect of their works, which are not authorized by the authors concerned or permitted by law. See WIPO Copyright Treaty, Apr. 12, 1997, S. Treaty Doc. No. 105-17, art. 11 (1997); WIPO Performances and Phonograms Treaty, Apr. 12, 1997, S. Treaty Doc. No. 105-17, art. 18 (1997) (same with respect to performers or producers of phonograms). The United States signed these treaties on April 12, 1997, and ratified them on October 21, 1998. See 144 Cong. Rec. 27,708 (1998) (Resolution of Ratification of Treaties). To implement these treaties, Congress enacted Title I of the Digital Millennium Copyright Act (DMCA) on October 28, 1998, with the twin 233 goals of protecting copyrighted works from piracy and promoting electronic commerce. See H.R. Rep. No. 105-551 (II), at 23 (1998); S. Rep. No. 105190, at 8 (1998); see also Universal City Studios, Inc. v. Corley, 273 F.3d 429, 440 (2d Cir. 2001); United States v. Elcom Ltd., 203 F. Supp. 2d 1111, 1129-30 (N.D. Cal. 2002). Congress accomplished these goals by enacting prohibitions relating to the circumvention of copyright protection systems as set forth in 17 U.S.C. § 1201, and the integrity of copyright management information pursuant to 17 U.S.C. § 1202. Cf. Microsoft Corp. v. AT&T Corp., 550 U.S. 437, 440 (2007) (“Congress is doubtless aware of the ease with which electronic media such as software can be copied, and has not left the matter untouched.”) (citing enactment of DMCA). Criminal enforcement has largely focused on violations of the anticircumvention and anti-trafficking prohibitions in 17 U.S.C. § 1201, and thus these are the main focus of this chapter. For a more complete discussion of the provisions that protect the integrity of copyright management information, as set forth in 17 U.S.C. § 1202, see Section B.5. of this Chapter. 2. Key Concepts: Access Controls vs. Copy Controls, Circumvention vs. Trafficking Section 1201 contains three prohibitions. First, it prohibits “circumvent[ing] a technological measure that effectively controls access to a work protected under this [copyright] title.” 17 U.S.C. § 1201(a)(1)(A). Second, it prohibits the manufacture of or trafficking in products or technology designed to circumvent a technological measure that controls access to a copyrighted work. 17 U.S.C. § 1201(a)(2). Third, it prohibits the manufacture of or trafficking in products or technology designed to circumvent measures that protect a copyright owner’s rights under the Copyright Act. 17 U.S.C. § 1201(b). As noted more fully in Section C. of this Chapter, the DMCA provides several exceptions. Title I of the DMCA creates a separate private right of action on behalf of “[a]ny person injured by a violation of section 1201 or 1202” in federal district court. 17 U.S.C. § 1203(a). These prohibitions are criminally enforceable against any person who violates them “willfully and for purposes of commercial advantage or private financial gain,” excluding nonprofit libraries, archives, educational institutions, and public broadcasting entities as defined by 17 U.S.C. § 118(f ). 17 U.S.C. § 1204(a), (b). Although civil actions do not require the claimant to establish that a DMCA violation was “willful” or for 234 Prosecuting Intellectual Property Crimes “commercial advantage or private financial gain,” the substantive law defining violations of §§ 1201 or 1202 is generally the same for both criminal and civil actions. Thus, published decisions relating to whether a violation of these DMCA sections has occurred in civil cases are instructive in criminal cases. a. Access Controls vs. Copy/Use Controls To understand the technical requirements of the DMCA’s criminal prohibitions, it is first important to understand what technology the DMCA generally applies to, and what the DMCA outlaws. Congress intended Title I of the DMCA to apply to copyrighted works that are in digital format and thus could easily and inexpensively be accessed, reproduced, and distributed over the Internet without the copyright owner’s authorization. The DMCA therefore applies to what one might call a “digital lock”—a technological measure that copyright owners use to control who may see, hear, or use copyrighted works stored in digital form. These digital locks are commonly called either “access controls” or “copy controls,” depending on what function the digital lock is designed to control. The DMCA states that a digital lock, or “technological measure” (as the DMCA refers to such locks), constitutes an access control “if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.” 17 U.S.C. § 1201(a)(3)(B). Thus, as the name suggests, an access control prevents users from accessing a copyrighted work without the author’s permission. For example, a technology that permits access to a newspaper article on an Internet website only by those who pay a fee or have a password would be considered an access control. See S. Rep. No. 105-190, at 11-12 (1998); e.g., CoxCom, Inc. v. Chaffee, 536 F.3d 101, 110 (1st Cir. 2008) (holding that cable company’s pay-per-view billing and delivery system that scrambles pay-per-view programming unless subscribers choose to purchase and view it constitutes an access control). In this example, the author (i.e., copyright owner) uses such fees or password requirements as access controls that allow the author to distinguish between those who have the author’s permission to read the online article from those who do not. If a user does not pay the fee or enter the password, then the user cannot lawfully read the article or otherwise access it. The DMCA also prescribes that a digital lock constitutes a copy control “if the measure, in the ordinary course of its operation, prevents, restricts, or V. Digital Milllenium Copyright Act 235 otherwise limits the exercise of a right of a copyright owner under this title.” 17 U.S.C. § 1201(b)(2)(B). The rights of a copyright owner include the exclusive rights to reproduce the copyrighted work, to prepare derivative works based upon the copyrighted work, to distribute copies by sale or otherwise, to perform the copyrighted work publicly, and to display the copyrighted work publicly. 17 U.S.C. § 106. In other words, such a digital lock prevents someone from making an infringing use of a copyrighted work after the user has already accessed the work. See S. Rep. No. 105-190, at 11-12 (1998); Universal City Studios, Inc. v. Corley, 273 F.3d 429, 441 (2d Cir. 2001). Although some courts will refer to such digital locks as “usage controls” because such locks conceivably seek to control all infringing uses, in practice, these digital locks typically control unauthorized copying of the work—hence the name “copy control.” To illustrate an example of a copy control, consider again the online newspaper article referenced above. A technological measure on an Internet website that permits a user to read (i.e., access) the online article but prevents the viewer from making a copy of the article once it is accessed would be a copy control. See S. Rep. No. 105-190, at 11-12 (1998). Thus, access and copy controls are different kinds of digital locks that are each designed to perform different functions. Whereas an access control blocks access to the copyrighted work—such as a device that permits access to an article on an Internet website only by those who pay a fee or have a password—a copy control protects the copyright itself—such as a device on the same website that prevents the viewer from copying the article once it is accessed. Although the DMCA’s distinction between an “access control” and a “copy control” appears straightforward in principle, courts are not always consistent in how they characterize a particular protection technology. For example, in the 1990s, the DVD industry developed the Content Scramble System (CSS)— an encryption scheme incorporated into DVDs that employs an algorithm configured by a set of “keys” to encrypt a DVD’s contents. For a DVD player to display a movie on a DVD encoded with CSS, the DVD player must have the “player keys” and the algorithm from the copyright owner. The Second Circuit characterized this CSS technology as an “access control” because a DVD player with the proper player keys and algorithm from the copyright owner “can display the movie on a television or a computer screen, but does not give a viewer the ability to use the copy function of the computer to copy the movie or to manipulate the digital content.” Corley, 273 F.3d at 437. More 236 Prosecuting Intellectual Property Crimes than one decision out of the Northern District of California, however, viewed the same technology as both an access control and a copy control. Apple, Inc. v. Psystar Corp., 673 F. Supp. 2d 931, 941 (N.D. Cal. 2009), aff’d in relevant part, 658 F.3d 1150 (9th Cir. 2011) (“Although Apple’s technological measure may have been primarily aimed at controlling access, it also effectively protected its right to copy.”); 321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, 1095 (N.D. Cal. 2004). Accordingly, prosecutors should be careful how they characterize technological controls as access or copy controls, and in some instances it may even be advisable for prosecutors to characterize a particular copyright protection system as both. b. Circumvention vs. Trafficking in Circumvention Tools Section 1201(a) of the DMCA proscribes two kinds of conduct regarding access controls: 1) circumvention of access controls, 17 U.S.C. § 1201(a)(1), and 2) trafficking in technology primarily designed to facilitate circumvention of access controls, 17 U.S.C. § 1201(a)(2). Both of these prohibitions relating to access controls are discussed more fully in Sections B.1. and B.2. of this Chapter. Unlike § 1201(a), however, Congress did not ban the act of circumventing copy controls. Instead, § 1201(b) only prohibits trafficking in technology primarily designed to facilitate the circumvention of copy controls. 17 U.S.C. § 1201(b)(1). Congress expressly chose not to prohibit the circumvention of copy controls in the DMCA because circumventing a copy control is essentially an act of copyright infringement that is already covered by copyright law. S. Rep. No. 105-190, at 12 (1998). Thus, § 1201(a)(1) (the “anti-circumvention provision”) prohibits the actual use of circumvention technology to obtain access to a copyrighted work without the copyright owner’s authority. “One of Congress’ purposes behind enacting the DMCA was targeting the circumvention of technological protections.” MGE UPS Sys., Inc. v. GE Consumer and Indus., Inc., 622 F.3d 361, 365 (5th Cir. 2010). In contrast, § 1201(a)(2) and 1201(b)(1) (the “antitrafficking provisions”) focus on the trafficking in circumvention technology, regardless of whether such technology ultimately leads a third party to circumvent an access or copy control. See Davidson & Assocs. v. Jung, 422 F.3d 630, 640 (8th Cir. 2005); Corley, 273 F.3d at 440-41. And with respect to the anti-trafficking provisions, “although both sections prohibit trafficking in a circumvention technology, the focus of § 1201(a)(2) is circumvention of V. Digital Milllenium Copyright Act 237 technologies designed to prevent access to a work, and the focus of § 1201(b)(1) is circumvention of technologies designed to permit access to a work but prevent copying of the work or some other act that infringes a copyright.” Davidson, 422 F.3d at 640 (emphasis in original); Ticketmaster L.L.C. v. RMG Techs., 507 F. Supp. 2d 1096, 1112 (C.D. Cal. 2007) (“Sections 1201(a)(2) and 1201(b) (1) differ only in that 1201(a)(2), by its terms, makes it wrongful to traffic in devices that circumvent technological measures that control access to protected works, while 1201(b)(1) makes it wrongful to traffic in devices that circumvent technological measures that protect rights of a copyright owner in a work.”) (emphasis in original); Craigslist, Inc. v. Naturemarket, Inc., 694 F. Supp. 2d 1039, 1056 (N.D. Cal. 2010) (same). The following chart illustrates the distinction: Access Copy Circumventing § 1201(a)(1) No DMCA violation, but potential copyright violation: 17 U.S.C. § 506; 18 U.S.C. § 2319 Trafficking § 1201(a)(2) § 1201(b)(1) 3. Differences Between the DMCA and Traditional Copyright Law Whereas copyright law focuses on “direct” infringement of a copyrighted work, the DMCA focuses largely on the facilitation of infringement through circumvention tools and services primarily designed or produced to circumvent an access or copy control. In other words, the DMCA represents a shift in focus from infringement to the tools of infringers. Before the DMCA was enacted, copyright law had only a limited application to the manufacture or trafficking of tools designed to facilitate copyright infringement. In 1984, the Supreme Court held that “the sale of copying equipment, like the sale of other articles of commerce, does not constitute contributory infringement if the product is widely used for legitimate, unobjectionable purposes. Indeed, it need merely be capable of substantial noninfringing uses.” Sony v. Universal City Studios, 464 U.S. 417, 442 (1984). Under this standard, a copy control circumvention tool would not violate copyright law if it were “widely used for legitimate ... purposes” or were merely “capable of substantial noninfringing uses.” Id. The DMCA shifts the focus from determining whether the downstream use of equipment will be used for infringement, to determining whether it 238 Prosecuting Intellectual Property Crimes was primarily designed to circumvent an access or copy control—even if such equipment were ultimately capable of substantial noninfringing uses. See 17 U.S.C. § 1201(a)(2)(A), (b)(1)(A). For example, with respect to software primarily designed to circumvent copy controls on DVDs, courts have held “that legal downstream use of the copyrighted material by customers is not a defense to the software manufacturer’s violation of the provisions of § 1201(b) (1).” 321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, 1097-98 (N.D. Cal. 2004); see also Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 943-44 (N.D. Cal. 2009) (“[T]he fair use of the copyrighted material by end users is not a defense to, and plays no role in determining, liability under the DMCA.”). Thus, although trafficking in circumvention technology that is capable of substantial noninfringing uses may not constitute copyright infringement, it may still violate the DMCA if such technology is primarily designed to circumvent access or copy controls. See RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311, at *7 (W.D. Wash. Jan. 18, 2000). The DMCA also added a new prohibition against circumventing access controls, even if such circumvention does not constitute copyright infringement. 17 U.S.C. § 1201(a)(1)(A). Prior to the DMCA, “the conduct of circumvention [of access controls] was never before made unlawful.” S. Rep. No. 105-190, at 12 (1998); cf. Chamberlain Group, Inc. v. Skylink Techs., Inc., 381 F.3d 1178, 1195-96 (Fed. Cir. 2004). By the same token, the DMCA does not contain a parallel prohibition against the use—infringing or otherwise—of copyrighted works once a user has access to the work. United States v. Elcom Ltd., 203 F. Supp. 2d 1111, 1121 (N.D. Cal. 2002) (holding that “circumventing use restrictions is not unlawful” under the DMCA); cf. S. Rep. No. 105-190, at 12 (1998) (“The copyright law has long forbidden copyright infringements, so no new prohibition was necessary.”). The terms “bypass” or “avoid” in the statute do not “encompass use of a copyrighted work subsequent to a circumvention merely because that use would have been subject to a technological measure that would have controlled access to the work, but for that circumvention.” MGE UPS Sys., Inc. v. GE Consumer and Indus., Inc., 622 F.3d 361, 366 (5th Cir. 2010). Although the DMCA “targets the circumvention of digital walls guarding copyrighted material (and trafficking in circumvention tools), [it] does not concern itself with the use of those materials after circumvention has occurred.” Universal City Studios, Inc. v. Corley, 273 F.3d 429, 443 (2d Cir. 2001); MGE V. Digital Milllenium Copyright Act 239 UPS Sys., 622 F.3d at 366 (same); cf. 321 Studios, 307 F. Supp. 2d at 1097 (holding that “the downstream uses of the [circumvention] software by the customers of 321 [the manufacturer], whether legal or illegal, are not relevant to determining whether 321 itself is violating [the DMCA]”). At the same time, the DMCA also cautions that “[n]othing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under this title.” 17 U.S.C. § 1201(c)(1); Elcom, 203 F. Supp. 2d at 1120 (“Congress did not ban the act of circumventing the use restrictions ... because it sought to preserve the fair use rights of persons who had lawfully acquired a work”); MGE UPS Sys., 622 F.3d at 366 (applying the DMCA to the “use of a copyrighted work subsequent to a circumvention ... would extend the DMCA beyond its intended purposes to reach extensive conduct already wellregulated by existing copyright laws”); United States v. Crippen, No. 09-703, 2010 WL 7198205, at *2 (C.D. Cal. Nov. 23, 2010) (“The plain meaning of § 1201(c) is clear; the law of copyright infringement (and fair use) is not altered by Congress’ decision to create liability for the separate act of circumvention in violation of § 1201(a).”). Thus, a criminal defendant who has violated the DMCA by circumventing an access control has not necessarily infringed a copyrighted work under copyright law. Accordingly, prosecutors must apply traditional copyright law instead of the DMCA to prosecute infringing uses of copyrighted works, including the circumvention of copy controls. By the same token, to demonstrate a violation of the DMCA, prosecutors need not establish copyright infringement, nor even an intent to infringe copyrights. In addition, unlike in a civil copyright claim, a victim’s failure to register its copyrighted work is not a bar to a DMCA action. See Section B.1.c. of this Chapter. 4. Other DMCA Sections That Do Not Concern Prosecutors Of the DMCA’s five titles, the only one that need concern prosecutors is Title I, which was codified at 17 U.S.C. §§ 1201-1205. The remaining four titles concern neither criminal prosecutions nor those provisions of the WIPO treaties that the DMCA was originally designed to implement. Title II concerns the liability of Internet service providers for copyright infringement over their networks. It amended the copyright code by enacting a new § 512, which gives Internet service providers some immunity in return for certain business practices, and requires them to obey certain civil subpoenas to identify subscribers alleged to have committed infringement. Section 512 does not, however, authorize criminal subpoenas for the same purpose. 240 Prosecuting Intellectual Property Crimes Title III of the DMCA clarifies that a lawful owner or lessee of a computer may authorize an unaffiliated service provider to activate the computer to service its hardware components. Title IV of the DMCA mandates a study of distance learning; permits libraries and archives to use the latest technology to preserve deteriorating manuscripts and other works; and permits transmitting organizations to engage in ephemeral reproductions, even if they need to violate the newly-added anti-circumvention features in the process. Finally, Title V of the DMCA extends the scope of the Copyright Act’s protection to boat hulls. For purposes of this Manual, all references to the DMCA concern Title I unless the context demands otherwise. B. Elements of the Anti-Circumvention and AntiTrafficking Provisions 1. Circumventing Access Controls—17 U.S.C. §§ 1201(a)(1) and 1204 The DMCA prohibits “circumvent[ing] a technological measure that effectively controls access to a work protected under this [copyright] title.” 17 U.S.C. § 1201(a)(1)(A). To prove a violation of 17 U.S.C. §§ 1201(a)(1) and 1204, the government must establish that the defendant 1. willfully 2. circumvented 3. a technological measure that effectively controls access (i.e., an access control) 4. to a copyrighted work 5. for commercial advantage or private financial gain. For purposes of the DMCA, prosecutors may look to the law of copyright infringement for guidance regarding the “willfully” element and the “commercial advantage” element. See Chapter II of this Manual. Two cases from the Federal Circuit have read an additional element into § 1201(a) offenses, holding that the unauthorized access must also infringe or facilitate infringing a right protected by the Copyright Act to establish violations of 17 U.S.C. § 1201(a)(1) and (a)(2). Storage Tech. Corp. v. Custom Hardware Eng’g & Consulting, Inc. (“StorageTek”), 421 F.3d 1307, 1318 (Fed. Cir. 2005) (quoting Chamberlain Group, Inc. v. Skylink Techs., Inc., 381 F.3d 1178, 1203 (Fed. Cir. 2004)). Although the results in Chamberlain and V. Digital Milllenium Copyright Act 241 StorageTek are consistent with Congress’s intent that § 1201(a) apply to measures controlling access to copyrighted works in digital form (see Section B.1.d. of this Chapter), the courts reached those results using a flawed analysis. Neither the DMCA’s plain language nor its legislative history permits circumvention of access controls or trafficking in access or copy control circumvention devices to enable a fair use, as opposed to an infringing use. The Ninth Circuit recently declined to adopt the Federal Circuit’s infringement nexus requirement, and explained that the Federal Circuit’s approach “is contrary to the plain language of the statute.” MDY Indus., LLC v. Blizzard Entm’t, Inc., 629 F.3d 928, 950 (9th Cir. 2010), as amended on denial of reh’g, (Feb. 17, 2011). The Ninth Circuit further noted “that the legislative history [of the DMCA] supports the conclusion that Congress intended to prohibit even non-infringing circumvention and trafficking in circumventing devices.” Id. The government has consistently argued that the DMCA prohibits the manufacture and trafficking in all circumvention tools, even those designed to facilitate fair use. See Section C.10.d. of this Chapter. Additionally, unlike the regional circuits, the Federal Circuit does not have the authority to develop a body of case law on copyright law that is independent of the regional circuits. StorageTek, 421 F.3d at 1311; Chamberlain, 381 F.3d at 1181. Accordingly, until a regional circuit adopts the StorageTek-Chamberlain position regarding the additional element to a § 1201(a) offense, prosecutors should oppose any attempts to cite these decisions as meaningful precedent. If a defendant does attempt to rely on these decisions, prosecutors are encouraged to contact CCIPS at (202) 514-1026 for sample briefs and other guidance to oppose them. a. Circumventing To “circumvent” an access control “means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A). Thus, to establish this element, the government first must prove that the defendant 1) bypassed a technological measure, and 2) did so without the authority of the copyright owner. “Circumvention requires either descrambling, decrypting, avoiding, bypassing, removing, deactivating or impairing a technological measure qua technological measure.” I.M.S. Inquiry Mgmt. Sys., Ltd. v. Berkshire Info. Sys., 242 Prosecuting Intellectual Property Crimes Inc., 307 F. Supp. 2d 521, 532 (S.D.N.Y. 2004); see also Egilman v. Keller & Heckman, 401 F. Supp. 2d 105, 113 (D.D.C. 2005) (same); Universal City Studios, Inc. v. Corley, 273 F.3d 429, 443 (2d Cir. 2001). In other words, circumvention of an access control occurs when someone bypasses the technological measure’s gatekeeping capacity, thereby precluding the copyright owner from determining which users have permission to access the digital copyrighted work and which do not. I.M.S., 307 F. Supp. 2d at 532. Arguably, “a person circumvents a technological measure only when he affirmatively performs an action that disables or voids the measure that was installed to prevent them from accessing the copyrighted material.” Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey, 497 F. Supp. 2d 627, 644 (E.D. Pa. 2007) (emphasis added) (holding that law firm did not circumvent robot. txt technological protection measure on Internet Archive website when such measure malfunctioned and allowed access to archived images that otherwise would have been blocked). For example, in Corley, the Second Circuit characterized CSS, the scheme for encrypting digital movies stored on DVDs, as an access control similar to “a lock on a homeowner’s door, a combination of a safe, or a security device attached to a store’s products.” Corley, 273 F.3d at 452-53. A licensed DVD player would be, in this metaphor, the homeowner’s key to the door. Id. The court held that defendant’s computer program, called “DeCSS,” circumvented CSS because it decrypted the CSS algorithm to enable “anyone to gain access to a DVD movie without using a [licensed] DVD player.” Id. at 453. DeCSS functions “like a skeleton key that can open a locked door, a combination that can open a safe, or a device that can neutralize a security device attached to a store’s products.” Id. Thus, using DeCSS to play a DVD on an unlicensed player circumvents an access control because it undermines the copyright owner’s ability to control who can access the DVD movie. Id. Circumvention does not occur, however, by properly using the technological measure’s gatekeeping capacity without the copyright owner’s permission. R.C. Olmstead, Inc. v. CU Interface LLC, 657 F. Supp. 2d 878, 889 (N.D. Ohio 2009) (“Simply put, CUI did not circumvent or bypass any technological measures of the RCO software—it merely used a username and password-the approved methodology—to access the software.”); Egilman, 401 F. Supp. 2d at 113 (holding that the definition of circumvention is missing “any reference to ‘use’ of a technological measure without the authority of the copyright owner”); see also I.M.S., 307 F. Supp. 2d at 533 (“Whatever the impropriety of V. Digital Milllenium Copyright Act 243 defendant’s conduct, the DMCA and the anti-circumvention provision at issue do not target this sort of activity.”). Using CSS as an example, a defendant does not circumvent a DVD’s access control, CSS, by merely borrowing another person’s licensed DVD player to view the DVD, even if the defendant did not receive permission from the owner of the licensed DVD player to “borrow” the player. No circumvention has occurred because the defendant would not have bypassed CSS. In fact, he would have viewed the DVD exactly as the copyright owner had intended—by using a licensed DVD player. Courts have similarly held that a defendant who without authorization uses a valid password to access a password-protected website containing copyrighted works does not engage in circumvention because the defendant used an authorized password rather than disabled the access control (here, the password protection mechanism). See Ground Zero Museum Workshop v. Wilson, 813 F. Supp. 2d 678, 692 (D.Md. 2011); R.C. Olmstead, 657 F. Supp. 2d at 889; Egilman, 401 F. Supp. 2d at 113-14; I.M.S., 307 F. Supp. 2d at 531-33. But see Actuate Corp. v. Int’l Bus. Machines, No. C-09-05892, 2010 WL 1340519, at *9 (N.D. Cal. Apr. 5, 2010) (“hold[ing] that unauthorized distribution of passwords and usernames avoids and bypasses a technological measure in violation of sections 1201(a)(2) and (b)(1)”); Microsoft Corp. v. EEE Bus. Inc., 555 F. Supp. 2d 1051, 1059 (N.D. Cal. 2008) (“By distributing a [software license key] without authorization, [defendant] effectively circumvented Microsoft’s technological measure to control access to a copyrighted work in violation of [17 U.S.C. § 1201(a)(2)].”). In this example, other charges might be available if the defendant obtained information from a protected computer. I.M.S., 307 F. Supp. 2d at 524-26 (discussing possible violation of the Computer Fraud and Abuse Act, 18 U.S.C. § 1030(a)). In addition, for there to be a circumvention pursuant to § 1201(a)(3)(A), the circumvention must occur “without the authority of the copyright owner.” 17 U.S.C. § 1201(a)(3)(A). A defendant who decrypts or avoids an access control measure with the copyright owner’s authority has not committed a “circumvention” within the meaning of the statute. See MDY Indus., LLC v. Blizzard Entm’t, Inc., 629 F.3d 928, 954 n.16 (9th Cir. 2010), as amended on denial of reh’g, (Feb. 17, 2011) (adopting the Second Circuit’s view in Corley that § 1201(a)(3)(A) “plainly exempts from § 1201(a) liability those whom a copyright owner authorizes to circumvent an access control measure”). The fact that a purchaser has the right to use a purchased product does not mean that the copyright owner has authorized the purchaser to circumvent the 244 Prosecuting Intellectual Property Crimes product’s access controls. For instance, a purchaser of a CSS-encrypted DVD movie clearly has the “authority of the copyright owner” to view the DVD but does not necessarily have the authority to view it on any platform capable of decrypting the DVD, 321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, 1096 (N.D. Cal. 2004) (holding “that the purchase of a DVD does not give to the purchaser the authority of the copyright holder to decrypt CSS”), nor “to perform non-licensed functions, such as copying DVD content.” Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 934 (N.D. Cal. 2009); see also Davidson & Assocs. v. Jung, 422 F.3d 630, 641 (8th Cir. 2005) (holding that purchasers of interactive gaming software had permission to use the game but lacked the copyright owner’s permission to circumvent the encryption measure controlling access to the game’s interactive mode). Thus, purchasers of products containing copyrighted works—by virtue of that purchase alone—do not necessarily have the copyright owner’s permission to circumvent a technological measure controlling access to the copyrighted work. b. Technological Measures That Effectively Control Access (“Access Control”) As already noted, 17 U.S.C. § 1201(a) concerns technological measures designed to prevent access to a copyrighted work—technology typically referred to as “access controls.” A technological measure does not constitute an access control under the DMCA unless it “effectively controls access to a work.” 17 U.S.C. § 1201(a)(1)(A). “[A] technological measure ‘effectively controls access to a [copyrighted] work’ if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work.” 17 U.S.C. § 1201(a)(3)(B). An access control “effectively controls access to a work” if its ordinary function and operation is to control access to a copyrighted work’s expression, regardless of whether or not the control is a strong means of protection. See, e.g., 321 Studios, 307 F. Supp. 2d at 1095. Significantly, courts have rejected the argument that the meaning of the term “effectively” is based on how successful the technological measure is in controlling access to a copyrighted work. See, e.g., id. (holding that the fact that the CSS decryption keys permitting access to DVDs were “widely available on the internet [sic]” did not affect whether CSS was “effective” under the V. Digital Milllenium Copyright Act 245 DMCA); Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 932 (N.D. Cal. 2009) (holding that the “allegation that CSS is no longer an effective technological measure because it has already been cracked or hacked, is of no moment”); Apple, Inc. v. Psystar Corp., 673 F. Supp. 2d 931, 941 (N.D. Cal. 2009), aff’d in relevant part, 658 F.3d 1150 (9th Cir. 2011) (“’The fact that circumvention devices may be widely available does not mean that a technological measure is not, as the DMCA provides, effectively protecting the rights of copyright owners in the ordinary course of its operation.’”) (quoting Sony Computer Entm’t Am., Inc. v. Divineo, Inc., 457 F. Supp. 2d 957, 965 (N.D. Cal. 2006)). For example, protection “measures based on encryption or scrambling ‘effectively control’ access to copyrighted works, although it is well known that what may be encrypted or scrambled often may be decrypted or unscrambled.” Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 318 (S.D.N.Y. 2000) (footnote omitted), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001). Equating “effectively” with “successfully” “would limit the application of the statute to access control measures that thwart circumvention, but withhold protection for those measures that can be circumvented” and consequently “offer protection where none is needed” while “withhold[ing] protection precisely where protection is essential.” Id.; Divineo, 457 F. Supp. 2d at 965 (same); 321 Studios, 307 F. Supp. 2d at 1095 (comparing similar argument to the claim that a deadbolt is ineffective because skeleton keys are readily available on the black market); DVD Copy Control Ass’n, 641 F. Supp. 2d at 932 (same); see also MDY Indus., LLC v. Blizzard Entm’t, Inc., 629 F.3d 928, 954 n.17 (9th Cir. 2010), as amended on denial of reh’g, (Feb. 17, 2011) (“The statutory definition of the phrase ‘effectively control access to a work’ does not require that an access control measure be strong or circumvention-proof. Rather, it requires an access control measure to provide some degree of control over access to a copyrighted work.”); Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 549 (6th Cir. 2004) (“[A] precondition for DMCA liability is not the creation of an impervious shield to the copyrighted work .... Otherwise, the DMCA would apply only when it is not needed.”) (internal citations omitted). Although the DMCA does not define “access,” at least one court has held that controlling access to a copyrighted work means controlling access to the expression (e.g., controlling the ability to see or to read the actual text of a copyrighted computer program, hear a copyrighted song, or watch a copyrighted movie) contained in a copyrighted work. Lexmark, 387 F.3d 246 Prosecuting Intellectual Property Crimes at 547 (holding that an authentication sequence that prevented “access” to a copyrighted computer program on a printer cartridge chip by preventing the printer from functioning and the program from executing did not “control[] access” under the DMCA because the copyrighted work’s expression (the computer program) was nonetheless “freely readable”); Auto Inspection Services, Inc. v. Flint Auto Auction, Inc., No. 06-15100, 2006 WL 3500868, at *8 (E.D. Mich. Dec. 4, 2006) (holding that a “user detection feature” that “is a part of the program itself and in no way controls access to the source code” does not constitute an access control because “it merely alerts [plaintiff] as to who [sic] is using the Program”). In the context of a computer program, the Sixth Circuit held that an access control under the DMCA must control access to the program’s copyrighted expression—i.e., control the ability to see or to read the program’s code. Lexmark, 387 F.3d at 548. On the other hand, a technological measure that controls only the function of a copyrighted computer program but leaves the code freely readable is not an access control under the DMCA. Compare id. at 547 (holding that there is no precedent deeming a control measure as one that “effectively controls access” under the DMCA “where the [purported] access-control measure left the literal code or text of the computer program or data freely readable”) and MDY Indus., LLC v. Blizzard Entm’t, Inc., 629 F.3d 928, 952 (9th Cir. 2010), as amended on denial of reh’g, (Feb. 17, 2011) (same), with Agfa Monotype Corp. v. Adobe Sys., Inc., 404 F. Supp. 2d 1030, 1036 (N.D. Ill. 2005) (holding that font embedding bits are not technological measures that “effectively control access” because they “have been available for free download from the Internet” and are “not secret or undisclosed. Embedding bits are not encrypted, scrambled or authenticated, and software applications ... need not enter a password or authorization sequence to obtain access to the embedding bits or the specification for the” font) and Davidson, 422 F.3d at 641 (holding that a technological measure that controlled access to a computer program’s expression that otherwise “was not freely available” “without acts of reverse engineering” constituted an “access control” under the DMCA). c. To a Copyrighted Work The access control also must have controlled access to a copyrighted work. See 17 U.S.C. § 1201(a)(1)(A), (2)(A)-(C) (referring repeatedly to “a work protected under this title [17]”). The protection of a copyrighted work is an essential element. See S. Rep. No. 105-190, at 28-29 (1998). The DMCA’s anticircumvention prohibition does not apply to someone who circumvents access V. Digital Milllenium Copyright Act 247 controls to a work in the public domain, like a book of Shakespeare, because such a protection measure controls access to a work that is not copyrighted. Cf. United States v. Elcom Ltd., 203 F. Supp. 2d 1111, 1131-32 (N.D. Cal. 2002). A victim’s failure to register its copyrighted work is not a bar to a DMCA action. See I.M.S. Inquiry Mgmt. Sys., Ltd. v. Berkshire Info. Sys., Inc., 307 F. Supp. 2d 521, 531 n.9 (S.D.N.Y. 2004); Medical Broad. Co. v. Flaiz, No. Civ.A. 02-8554, 2003 WL 22838094, at *3 (E.D. Pa. Nov. 25, 2003) (finding that “[w]hile a copyright registration is a prerequisite under 17 U.S.C. § 411(a) for an action for [civil] copyright infringement, claims under the DMCA ... are simply not copyright infringement claims and are separate and distinct from the latter”) (citation omitted). d. How Congress Intended the Anti-Circumvention Prohibition to Apply Courts have acknowledged that, on its face, § 1201(a)(1) prescribes that one unlawfully circumvents an access control even where the ultimate goal of such circumvention is fair use of a copyrighted work. See, e.g., Reimerdes, 111 F. Supp. 2d at 304 (holding that an unlawful circumvention of a technological measure can occur even though “[t]echnological access control measures have the capacity to prevent fair uses of copyrighted works as well as foul”). Although Congress was concerned that the DMCA’s anti-circumvention prohibition could be applied to prevent circumvention of access controls for legitimate fair uses, Congress concluded that strong restrictions on circumvention of access control measures were essential to encourage digital works because otherwise such works could be pirated and distributed over the Internet too easily. See Lexmark, 387 F.3d at 549. For this reason, courts will strictly apply § 1201(a) to copyrighted expression stored in a digital format whereby, for instance, executing encrypted computer code containing the copyrighted expression actually generates the visual and audio manifestation of protected expression. Lexmark, 387 F.3d at 548 (holding that Congress intended § 1201(a) to apply where executing “encoded data on CDs translates into music and on DVDs into motion pictures, while the program commands in software for video games or computers translate into some other visual and audio manifestation”); see also MDY Indus., LLC v. Blizzard Entm’t, Inc., 629 F.3d 928, 954 (9th Cir. 2010), as amended on denial of reh’g, (Feb. 17, 2011) (dynamic non-literal elements of the “World of Warcraft” game protected by the “Warden” program cannot be accessed without connecting to 248 Prosecuting Intellectual Property Crimes a “Blizzard” server’s log on program); Nintendo of Am. Inc. v. Chan, No. CV 09-4203, 2009 WL 2190186, at *3 (C.D. Cal. July 21, 2009) (Nintendo DS security system controls access to Nintendo’s copyrighted DS video games by repeatedly transferring information to gain access to the IPL and Boot Code programs); 321 Studios, 307 F. Supp. 2d at 1095 (movies on DVDs protected by an encryption algorithm (CSS) cannot be watched without a DVD player that contains an access key decrypting CSS); Davidson, 422 F.3d at 641 (encrypted algorithm on computer game prevented unauthorized interactive use of computer game online); Pearl Inv., LLC v. Standard I/O, Inc., 257 F. Supp. 2d 326, 349 (D. Me. 2003) (“encrypted, password-protected virtual private network” prevented unauthorized access to copyrighted computer software); Sony Computer Entm’t Am., Inc. v. Gamemasters, 87 F. Supp. 2d 976, 981 (N.D. Cal. 1999) (game console prevented unauthorized operation of video games); RealNetworks, Inc. v. Streambox, Inc., Civ. No. 2:99CV02070, 2000 WL 127311, at *3 (W.D. Wash. Jan. 18, 2000) (authentication sequence prevented unauthorized access to streaming copyrighted “digital works” online). On the other hand, Congress did not intend the DMCA to apply (and courts are less likely to apply it) where executing a copyrighted computer program creates no protectable expression (as it would for a work in digital form), but instead results in an output that is purely functional. See, e.g., Lexmark, 387 F.3d at 548 (holding that a computer chip on a replacement printer cartridge that emulates an authentication sequence executing a copyrighted code on a manufacturer’s printer cartridge did not violate § 1201(a) because executing the code merely controls printer functions such as “paper feeding,” “paper movement,” and “motor control” and therefore “is not a conduit to protectable expression”); Chamberlain Group, Inc. v. Skylink Techs., Inc., 381 F.3d 1178, 1204 (Fed. Cir. 2004) (holding that use of a transmitter to emulate a copyrighted computer code in a garage door opener did not violate § 1201(a) because executing the code merely performed the function of opening the garage door). Accordingly, prosecutors should bear in mind that courts are more inclined to rule that a defendant violated § 1201(a) if his conduct occurred in a context to which Congress intended the statute to apply—i.e., when it involves an access control that protects access to copyrighted expression stored in digital form. For questions on this often technical point, prosecutors may wish to consult CCIPS at (202) 514-1026. V. Digital Milllenium Copyright Act 249 e. Regulatory Exemptions to Liability Under § 1201(a)(1) Before prosecuting a charge of unlawful access control circumvention, § 1201(a)(1)(A), prosecutors should confirm whether the defendant’s actions fall within the Librarian of Congress’s latest regulatory exemptions. Because Congress was concerned that the DMCA’s prohibitions against circumventing access controls might affect citizens’ noninfringing uses of works in unforeseeable and adverse ways, Congress created a recurring rulemaking proceeding to begin two years after the DMCA’s enactment and every three years thereafter. 17 U.S.C. § 1201(a)(1)(C), (D). Thus, the first rulemaking took place in 2000, the second was in 2003, the third was in 2006, and the fourth occurred as an interim rulemaking in 2009 and was promulgated in final form in July of 2010. The fifth DMCA rulemaking proceeding took place in 2012, and concluded in October of 2012. Specifically, the DMCA provides that its prohibition on access circumvention itself, 17 U.S.C. § 1201(a)(1)(A), will not apply to users’ control of certain types of works if, upon the recommendation of the Register of Copyrights, the Librarian of Congress concludes that the ability of those users “to make noninfringing uses of [a] particular class of work[]” is “likely to be ... adversely affected” by the prohibition. 17 U.S.C. § 1201(a)(1) (B). The statute makes clear, however, that any exceptions to § 1201(a)(1)(A) adopted by the Librarian of Congress are not defenses to violations of the antitrafficking provisions contained in § 1201(a)(2) and 1201(b). See 17 U.S.C. § 1201(a)(1)(E). The current exemptions are effective beginning on October 28, 2012, and they are as follows: • Literary works, distributed electronically, that are protected by technological measures which either prevent the enabling of read-aloud functionality or interfere with screen readers or other applications or assistive technologies when: (i) a copy of such a work is lawfully obtained by a blind or other person with a disability provided that the rights owner is remunerated, as appropriate, for the price of the mainstream copy of the work as made available to the general public through customary channels; or (ii) such work is a nondramatic literary work, lawfully obtained and used by an authorized entity pursuant to 17 U.S.C. 121. • Computer programs that enable wireless telephone handsets to execute lawfully obtained software applications, where circumvention is 250 Prosecuting Intellectual Property Crimes • • • accomplished for the sole purpose of enabling interoperability of such applications with computer programs on the telephone handset. Computer programs, in the form of firmware or software, that enable a wireless telephone handset originally acquired from the operator of a wireless telecommunications network or retailer no later than ninety days after the effective date of this exemption to connect to a different wireless telecommunications network, if the operator of the wireless communications network to which the handset is locked has failed to unlock it within a reasonable period of time following a request by the owner of the wireless telephone handset, and when circumvention is initiated by the owner, an individual consumer, who is also the owner of the copy of the computer program in such wireless telephone handset, solely in order to connect to a different wireless telecommunications network, and such access to the network is authorized by the operator of the network. Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary because reasonably available alternatives, such as noncircumventing methods or using screen capture software as provided for in alternative exemptions, are not able to produce the level of high-quality content required to achieve the desired criticism or comment on such motion pictures, and where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in the following instances: (i) noncommercial videos; (ii) documentary films; (iii) nonfiction multimedia ebooks offering film analysis; and (iv) education purposes in film studies or other courses requiring close analysis of film and media excerpts. Motion pictures that are lawfully made and acquired via online distribution services and that are protected by various technological protection measures, where the person engaging in circumvention believes and has reasonable grounds for believing that circumvention is necessary because reasonably available alternatives, such as noncircumventing methods or using screen capture software as provided for in alternative exemptions, are not able to produce the level of highquality content required to achieve the desired criticism or comment V. Digital Milllenium Copyright Act 251 • • 252 on such motion pictures, and where circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in the following instances: (i) noncommercial videos; (ii) documentary films; (iii) nonfiction multimedia ebooks offering film analysis; and (iv) educational purposes in film studies or other courses requiring close analysis of film and media excerpts. Motion pictures on DVDs that are lawfully made and acquired and that are protected by the Content Scrambling System, where the circumvention, if any, is undertaken using screen capture technology that is reasonably represented and offered to the public as enabling the reproduction of motion picture content after such content has been lawfully decrypted, when such representations have been reasonably relied upon by the user of such technology, when the person engaging in the circumvention believes and has reasonable grounds for believing that the circumvention is necessary to achieve the desired criticism or comment, and where the circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in the following instances: (i) noncommercial videos; (ii) documentary films; (iii) nonfiction multimedia ebooks offering film analysis; and (iv) educational purposes. Motion pictures that are lawfully made and acquired via online distribution services and that are protected by various technological protection measures, where the circumvention, if any, is undertaken using screen capture technology that is reasonably represented and offered to the public as enabling the reproduction of motion picture content after such content has been lawfully decrypted, when such representations have been reasonably relied upon by the user of such technology, when the person engaging in the circumvention believes and has reasonable grounds for believing that the circumvention is necessary to achieve the desired criticism or comment, and where the circumvention is undertaken solely in order to make use of short portions of the motion pictures for the purpose of criticism or comment in the following instances: (i) noncommercial videos; (ii) documentary films; (iii) nonfiction multimedia ebooks offering film analysis; and (iv) educational purposes. Prosecuting Intellectual Property Crimes • Motion pictures and other audiovisual works on DVDs that are protected by the Content Scrambling System, or that are distributed by an online service and protected by technological measures that control access to such works, when circumvention is accomplished solely to access the playhead and/or related time code information embedded in copies of such works and solely for the purpose of conducting research and development for the purpose of creating players capable of rendering visual representations of the audible portions of such works and/or audible representations or descriptions of the visual portions of such works to enable an individual who is blind, visually impaired, deaf, or hard of hearing, and who has lawfully obtained a copy of such a work, to perceive the work; provided however, that the resulting player does not require circumvention of technological measures to operate. See 37 C.F.R. § 201.40 (2012). 2. Trafficking in Access Control Circumvention Tools and Services—17 U.S.C. §§ 1201(a)(2) and 1204 In addition to prohibiting the circumvention of access controls, the DMCA also prohibits the manufacture of, or trafficking in, any technology that circumvents access controls without the copyright owner’s permission. 17 U.S.C. § 1201(a)(2). To prove a violation of 17 U.S.C. .§§ 1201(a)(2) and 1204, the government must establish that the defendant 1. willfully 2. manufactured or trafficked in 3. a technology, product, service, or part thereof 4. that either: a. is primarily designed or produced for the purpose of b. “has only limited commercially significant purpose or use other than” or c. “is marketed by that person or another acting in concert with that person with that person’s knowledge for use in” 5. circumventing an access control without authorization from the copyright owner 6. for commercial advantage or private financial gain. For purposes of the DMCA, prosecutors may look to the law of copyright infringement for guidance regarding the “willfully” element and the “commercial advantage” element, discussed in Chapter II of this Manual. For V. Digital Milllenium Copyright Act 253 a complete discussion of establishing the element regarding circumventing an access control, see Sections B.1.a.-e. of this Chapter. The Federal Circuit’s additional element for establishing a violation of § 1201(a)(2)—that the unauthorized access must also infringe or facilitate infringing a right protected by the Copyright Act—is discussed in Section B.1. a. Trafficking Section 1201(a)(2) states that “[n]o person shall manufacture, import, offer to the public, provide, or otherwise traffic in” a technology or service that unlawfully circumvents an access control. To “traffic” in such technology means to engage either in dealings in that technology or service or in conduct that necessarily involves awareness of the nature of the subject of the trafficking. Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 325 (S.D.N.Y. 2000), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001). To “provide” technology means to make it available or to furnish it. Id. The phrase “or otherwise traffic in” modifies and gives meaning to the words “offer” and “provide.” Id. Thus, “the anti-trafficking provision of the DMCA is implicated where one presents, holds out or makes a circumvention technology or device available, knowing its nature, for the purpose of allowing others to acquire it.” Id. This standard for “trafficking,” therefore, hinges on evaluating the trafficker’s purpose for making the circumvention technology available. See id. at 341 n.257 (“In evaluating purpose, courts will look at all relevant circumstances.”). Significantly, however, the government need not prove “an intent to cause harm” to establish the trafficking element. Cf. Universal City Studios, Inc. v. Corley, 273 F.3d 429, 457 (2d Cir. 2001). This standard is particularly helpful for determining whether a defendant has trafficked online in unlawful circumvention technology. For example, courts may view a defendant’s trafficking to include offering circumvention technology for download over the Internet, or posting links to websites that automatically download such technology when a user is transferred by hyperlink, where the purpose of such linking is to allow others to acquire the circumvention technology. See, e.g., Reimerdes, 111 F. Supp. 2d at 325, 341 n.257 (holding that offering and providing for download a computer program to circumvent DVD access controls for the purpose of disseminating the program satisfies trafficking element of § 1201(a)(2)). In addition, at least one court has found that posting a hyperlink to web pages “that display nothing more than the [circumventing] code or present the user only with the choice of commencing a download of [the code] and no other content” also constitutes 254 Prosecuting Intellectual Property Crimes “trafficking” under the DMCA because the defendant’s express purpose in linking to these web pages was to disseminate the circumventing technology. Id. at 325. In contrast, posting a link to a web page that happens to include, among other content, a hyperlink for downloading (or transferring to a page for downloading) a circumvention program would not, alone, constitute “trafficking” in the program “regardless of purpose or the manner in which the link was described.” Id.; see also id. at 341 n.257 (“A site that deep links to a page containing only [the circumventing program] located on a site that contains a broad range of other content, all other things being equal, would more likely be found to have linked for the purpose of disseminating [the program] than if it merely links to the home page of the linked-to site.”). This result is consistent with the general principle that a website owner cannot be held responsible for all the content of the sites to which it provides links. Id. at 325 n.180 (quotation omitted). Thus, posting a link (or “linking”) to a circumvention program could constitute “trafficking” if the person linking to the program 1) knew that the program is on the linked-to site; 2) knew that the program constituted unlawful circumvention technology; and 3) posted the link for the purpose of disseminating that technology. See id. at 325, 341. b. In a Technology, Product, Service, or Part Thereof Section 1201(a)(2) prohibits trafficking “in any technology, product, service, device, component, or part thereof ” that unlawfully circumvents access controls. This language is “all-encompassing: it includes any tool, no matter its form, that is primarily designed or produced to circumvent technological protection.” United States v. Elcom Ltd., 203 F. Supp. 2d 1111, 1123 (N.D. Cal. 2002). This element is not limited to conventional devices but instead includes “any technology,” including computer code and other software, capable of unlawful circumvention. Reimerdes, 111 F. Supp. 2d at 317 & n.135. In addition, the government satisfies this element even if only one “part” or feature of the defendant’s technology unlawfully circumvents access controls. See 321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, 1098 (N.D. Cal. 2004). c. Purpose or Marketing of Circumvention Technology Section 1201(a)(2) prohibits trafficking in technology that unlawfully circumvents access controls and either “is primarily designed or produced for th[at] purpose,” “has only limited commercially significant purpose or use other V. Digital Milllenium Copyright Act 255 than” such purpose; or is knowingly marketed for such purpose. 17 U.S.C. § 1201(a)(2)(A)-(C). Thus, “only one of the[se] three enumerated conditions must be met” to satisfy this element. See 321 Studios, 307 F. Supp. 2d at 1094; see also Dish Network L.L.C. v. Whitehead, No. 3:09-cv-532-J-32JRK, 2011 WL 6181732, at *5 (M.D. Fla. Dec. 13, 2011); EchoStar Satellite LLC v. ViewTech, Inc., Case No. 07cv1273, 2011 WL 1522409, at *2 (S.D. Cal. April 20, 2011). And, as noted elsewhere, the fact that a particular circumvention technology is capable of substantial noninfringing uses is not a defense to trafficking in technology that circumvents access controls and violates one of the three conditions enumerated in § 1201(a)(2)(A)-(C). See Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 941 (N.D. Cal. 2009) (“no grounding in law ... to assert a ‘fair use’ defense based on [circumvention technology] being capable of substantial noninfringing use”); Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 323-24 (S.D.N.Y. 2000), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001); RealNetworks, Inc. v. Streambox, Inc., No. 2:99CV02070, 2000 WL 127311, at *8 (W.D. Wash. Jan. 18, 2000). i. Primarily Designed or Produced Trafficking in circumvention technology violates § 1201(a)(2)(A) where its “primary purpose” is to circumvent technological measures controlling access to, for example, copyrighted video games (Davidson & Assocs. v. Jung, 422 F.3d 630, 641 (8th Cir. 2005); Sony Computer Entm’t Am., Inc. v. Gamemasters, 87 F. Supp. 2d 976, 987 (N.D. Cal. 1999)); copyrighted streaming video or music content (Streambox, No. 2:99CV02070, 2000 WL 127311, at *7-*8); copyrighted satellite programming (Dish Network, L.L.C. v. SatFTA, No. 5:08cv-01561, 2011 WL 856268, at *3-*4 (N.D. Cal. 2011 March 9, 2011)); and copyrighted movies encrypted onto DVDs (Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 318-19 (S.D.N.Y. 2000), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001); 321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, 1098 (N.D. Cal. 2004); Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 933 (N.D. Cal. 2009)). Whether a technology’s “primary purpose” is to circumvent an access control is determined by the circumvention technology’s primary function, not the trafficker’s subjective purpose. DVD Copy Control Ass’n, 641 F. Supp. 2d at 940 (“it is the product’s function and not the designer’s motivation that determines liability”); see also Reimerdes, 111 F. Supp. 2d at 319 (motivation 256 Prosecuting Intellectual Property Crimes of developer “immaterial” to whether the defendants “violated the antitrafficking provision of the DMCA”). The defendant’s subjective motive may, however, affect whether his conduct falls within one of the DMCA’s statutory exceptions. Id. (Conduct at issue “prohibited [under DMCA] irrespective of why the [circumvention technology] was written, except to whatever extent motive may be germane to determining whether [defendants’] conduct falls within one of the statutory exceptions.”). See Section C. of this Chapter for an overview of these exceptions. In Reimerdes, which concerned the CSS DVD-encryption scheme, the court found that “(1) CSS is a technological means that effectively controls access to plaintiffs’ copyrighted works, (2) the one and only function of [the defendant’s program] is to circumvent CSS, and (3) defendants offered and provided [the program] by posting it on their web site.” Reimerdes, 111 F. Supp. 2d at 319. The court held that it was “perfectly obvious” that the program “was designed primarily to circumvent CSS.” Id. at 318. Defendants argued that their program was not created for the “purpose” of pirating copyrighted movies, but rather to allow purchasers of DVDs to play them on unlicensed DVD players running the Linux operating system. Id. at 319. As the court held, however, “whether the development of a Linux DVD player motivated those who wrote [the program] is immaterial to the question” of whether the defendants “violated the anti-trafficking provision[s] of the DMCA.” Id.; see also DVD Copy Control Ass’n, 641 F. Supp. 2d at 940. The trafficking “of the program is the prohibited conduct—and it is prohibited irrespective of why the program was written.” Reimerdes, 111 F. Supp. 2d at 319. And it is equally irrelevant for whom the program was written. See Sony Computer Entm’t Am., Inc. v. Divineo, Inc., 457 F. Supp. 2d 957, 965 (N.D. Cal. 2006) (“The fact that users of mod chips must be technologically sophisticated is not evidence that the purpose of the mod chips is not circumvention.”). ii. Limited Commercially Significant Purpose Other Than Circumvention Whether a technology has only limited commercially significant purpose other than circumvention is a separate inquiry from whether its primary purpose was to circumvent, and it requires a fact-specific inquiry that often hinges on whether the circumvention technology is “free and available.” Some courts, however, have ruled that a particular technology “is primarily designed or produced for the purpose of circumventing” access controls (§ 1201(a)(2)(A)) and also “has only limited commercially significant purpose” other than such V. Digital Milllenium Copyright Act 257 circumvention (§ 1201(a)(2)(B)). See, e.g., Davidson, 422 F. 3d at 641 (holding that defendant’s circumvention technology “had limited commercial purpose because its sole purpose was ... circumventing [the] technological measures controlling access to Battle.net and the [computer] games”); Streambox, No. 2:99CV02070, 2000 WL 127311, at *8 (holding that defendant violated § 1201(a)(2)(A) and (a)(2)(B) by trafficking in circumvention technology that had “no significant commercial purpose other than to enable users to access and record protected content”). However, at least one court suggested that whether a defendant violates § 1201(a)(2)(B) “is a question of fact for a jury to decide,” even where the court otherwise finds that the defendant has violated § 1201(a)(2)(A). 321 Studios, 307 F. Supp. 2d at 1098. iii. Knowingly Marketed for Circumvention When accused of having marketed technology for use in circumventing access controls in violation of § 1201(a)(2)(C), defendants have raised First Amendment defenses—particularly where only a part of a product circumvents access controls—contending that marketing the product may include dissemination of information about the product’s other, legal attributes. Although a more complete discussion analyzing the DMCA’s validity under the First Amendment is discussed in Section C.10.b. of this Chapter, it is worth noting here that “the First Amendment does not protect commercial speech that involves illegal activity,” even if that commercial speech is merely instructions for violating the law. 321 Studios, 307 F. Supp. 2d at 1098-99 (citing Florida Bar v. Went For It, Inc., 515 U.S. 618, 623-24 (1995)); see also Corley, 273 F.3d at 447 (citing United States v. Raymond, 228 F.3d 804, 815 (7th Cir. 2000) (holding that “First Amendment does not protect instructions for violating the tax laws”)). Thus, knowingly marketing technology for use in circumventing access controls in violation of § 1201(a)(2)(C) constitutes illegal activity, and hence, unprotected speech. 321 Studios, 307 F. Supp. 2d at 1099 (“[A]s 321 markets its software for use in circumventing CSS, this Court finds that 321’s DVD copying software is in violation of the marketing provisions of §§ 1201(a)(2) and (b)(1).”). 3. Trafficking in Tools, Devices, and Services to Circumvent Copy Controls—17 U.S.C. §§ 1201(b)(1) and 1204 As noted above, the DMCA prohibits the manufacture or trafficking in any technology that circumvents copy controls without the copyright owner’s 258 Prosecuting Intellectual Property Crimes permission. 17 U.S.C. § 1201(b)(1). To prove a violation of 17 U.S.C. §§ 1201(b)(1) and 1204, the government must establish that the defendant 1. 2. 3. 4. willfully manufactured or trafficked in a technology, product, service, or part thereof that either: a. “is primarily designed or produced for the purpose of ” b. “has only limited commercially significant purpose or use other than” or c. “is marketed by that person or another acting in concert with that person with that person’s knowledge for use in” 5. “circumventing” 6. “protection afforded by a technological measure that effectively protects a right of a copyright owner under this title in a work or a portion thereof ” 7. “for commercial advantage or private financial gain.” See 17 U.S.C. §§ 1201(a)(2)(A)-(C), 1204. For purposes of the DMCA, prosecutors may look to the law of copyright infringement for guidance regarding the “willfully” element and the “commercial advantage” element. See Chapter II of this Manual. In addition, because the second, third, and fourth elements of a § 1201(b) violation operate in the same way as do the comparable elements of a § 1201(a) violation, a complete discussion of those elements may be found in Sections B.1. and B.2. of this Chapter. a. Circumventing To “circumvent protection afforded by a technological measure,” as set forth in 17 U.S.C. § 1201(b), “means avoiding, bypassing, removing, deactivating, or otherwise impairing a technological measure.” 17 U.S.C. § 1201(b)(2) (A). To establish this element, the government must show that the defendant trafficked in technology allowing the end user to bypass a copy or use control that “effectively protects the right of a copyright owner.” 17 U.S.C. § 1201(b) (1), (b)(2)(B). Courts have found that the following technologies circumvent copy controls: (1) a computer program that removes user restrictions from an “ebook” to make such files “readily copyable” and “easily distributed electronically,” United States v. Elcom Ltd., 203 F. Supp. 2d 1111, 1118-19 (N.D. Cal. 2002); (2) technology that bypasses copy controls intended to prevent the copying of streaming copyrighted content, RealNetworks, Inc. v. V. Digital Milllenium Copyright Act 259 Streambox, Inc., No. 2:99CV02070, 2000 WL 127311, at *6-*8 (W.D. Wash. Jan. 18, 2000); (3) technology that bypasses copy controls intended to prevent the copying of copyrighted Nintendo DS video games, Nintendo of Am. Inc. v. Chan, No. CV 09-4203, 2009 WL 2190186, at *3 (C.D. Cal. July 21, 2009); and (4) technology that bypasses a scheme intended to “control copying of [encrypted] DVDs,” 321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, 1097 (N.D. Cal. 2004). Further, at least two courts have held that bypassing a DVD’s access and copy controls unlawfully “avoids and bypasses” (i.e., circumvents) the DVD’s copy control pursuant to § 1201(b)(2) (A). Id. at 1098; Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 935 (N.D. Cal. 2009). b. Technological Measure That Effectively Protects a Right of a Copyright Owner Under This Title (“Copy Control”) “[A] technological measure ‘effectively protects a right of a copyright owner under this title’ if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner under this title.” 17 U.S.C. § 1201(b)(2)(B). The “rights of a copyright owner” include all the exclusive rights set forth in 17 U.S.C. § 106: the rights to reproduce the copyrighted work, to prepare derivative works based upon the copyrighted work, to distribute copies by sale or otherwise, to perform the copyrighted work publicly, and to display the copyrighted work publicly. Elcom, 203 F. Supp. 2d at 1124. Thus, a technological measure “‘effectively protects the right of a copyright owner’ if, in the ordinary course of its operation, it prevents, restricts or otherwise limits the exercise of any of the rights set forth in Section 106.” See id. at 1124 (quoting 17 U.S.C. § 1201(b)(2)(B)); Agfa Monotype Corp. v. Adobe Sys., Inc., 404 F. Supp. 2d 1030, 1039 (N.D. Ill. 2005) (holding that computer font embedding bits do not protect the rights of a copyright owner where “[s]uch embedding bits do not prevent copying, and a computer program can simply proceed to copy the ... [f ]ont data regardless of the setting of the bit”). Notably, the government has successfully taken the position that although fair use normally limits a copyright owner’s right to claim infringement, § 1201(b)(1) nonetheless prohibits trafficking in all tools that circumvent copy controls, even if such tools circumvent copy protections for the purpose of facilitating fair uses of a copyrighted work. See, e.g., Elcom, 203 F. Supp. 2d at 1124 (“Nothing within the express language would permit trafficking in devices designed to bypass use restrictions in order to enable a fair use, as opposed 260 Prosecuting Intellectual Property Crimes to an infringing use.”). Hence, § 1201(b)(1) bans trafficking in all tools that are primarily designed or produced for the purpose of circumventing copy controls, regardless of whether the downstream use of such tools is infringing or not. See id. “It is the technology itself at issue, not the uses to which the copyrighted material may be put.” 321 Studios, 307 F. Supp. 2d at 1097; accord Dish Network, L.L.C. v. SatFTA, No. 5:08-cv-01561, 2011 WL 856268, at *4 (N.D. Cal. March 9, 2011) (holding defendant liable for § 1201(b)(1) violations and explaining that “[w]hile the DMCA provides for a limited ‘fair use’ exception for certain end users of copyrighted works, the exception does not apply to manufacturers or traffickers ….”) (quoting Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 942 (N.D. Cal. 2009); Sony Computer Entm’t Am., Inc. v. Divineo, Inc., 457 F. Supp. 2d 957, 965 (N.D. Cal. 2006) (“downstream customers’ lawful or fair use of circumvention devices does not relieve [defendant] from liability for trafficking in such devices under the DMCA”). This is consistent with Congress’s intent in enacting the DMCA: “Congress did not ban the act of circumventing the use restrictions. Instead, Congress banned only the trafficking in and marketing of devices primarily designed to circumvent the use restriction protective technologies. Congress did not prohibit the act of circumvention because it sought to preserve the fair use rights of persons who had lawfully acquired a work.” Elcom, 203 F. Supp. 2d at 1120 (emphasis omitted); Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 942 (N.D. Cal. 2009) (same); see also Universal City Studios, Inc. v. Corley, 273 F.3d 429, 443 (2d Cir. 2001) (“[T]he DMCA targets the circumvention of digital walls guarding copyrighted material (and trafficking in circumvention tools), but does not concern itself with the use of those materials after circumvention has occurred.”) (emphasis and citations omitted). Accordingly, while it is not unlawful to circumvent a copy or usage control for the purpose of engaging in fair use, it is unlawful under § 1201(b)(1) to traffic in tools that allow fair use circumvention. Elcom, 203 F. Supp. 2d at 1125; DVD Copy Control Ass’n, 641 F. Supp. 2d at 942 (same). Further, “legal downstream use of the copyrighted material by customers is not a defense to the software manufacturer’s violation of the provisions of § 1201(b)(1).” 321 Studios, 307 F. Supp. 2d at 1097-98. V. Digital Milllenium Copyright Act 261 4. Alternate § 1201(b) Action—Trafficking in Certain Analog Videocassette Recorders and Camcorders Congress’s decision to include a prohibition regarding analog technology may be a non sequitur in an act entitled the “Digital Millennium Copyright Act.” Nonetheless, § 1201(k)(5) of the DMCA prescribes that any violation of 17 U.S.C. § 1201(k)(1) regarding copy controls on certain analog recording devices “shall be treated as a violation of ” § 1201(b)(1). Section 1201(k)(1)(A) proscribes trafficking in any VHS, Beta, or 8mm format analog video cassette recorder or 8mm analog video cassette camcorder unless such recorder or camcorder “conforms to the automatic gain control copy control technology.” 17 U.S.C. § 1201(k)(1)(A)(i)-(iv). The same prohibition applies to any “analog video cassette recorder that records using an NTSC format video input.” 17 U.S.C. § 1201(k)(1)(A)(v). Section 1201(k)(1)(B) also prohibits trafficking in any VHS or 8mm format analog video cassette recorder if the recorder’s design (previously conforming with § 1201(k)(1)(A)) was modified to no longer conform with automatic gain control copy technology. 17 U.S.C. § 1201(k) (1)(B)(i). Similarly, the DMCA prohibits trafficking in such an analog video cassette recorder if it “previously conformed to the four-line colorstripe copy control technology” but was later modified so that it “no longer conforms to such technology.” 17 U.S.C. § 1201(k)(1)(B)(ii). In addition, the DMCA requires “manufacturers that have not previously manufactured or sold VHS [or 8mm] format analog video cassette recorder[s] to conform to the four-line colorstripe copy control technology.” Id. Notably, § 1201(k) does not (1) require analog camcorders to conform to the automatic gain control copy control technology for video signals received through a camera lens; (2) apply to the manufacture or trafficking in any “professional analog video cassette recorder;” or (3) apply to transactions involving “any previously owned analog video cassette recorder” that had been both legally manufactured and sold when new and also not later modified to violate § 1201(k). 17 U.S.C. § 1201(k)(3)(A)-(C). 5. Falsifying, Altering, or Removing Copyright Management Information—17 U.S.C. § 1202 Section 1202 prohibits anyone from knowingly falsifying, removing, or altering “copyright management information”—such as a copyrighted work’s title, copyright notice, or author—with the intent to induce, enable, facilitate, or conceal infringement. 17 U.S.C. § 1202(a)(1), (b)(1), (c) (defining 262 Prosecuting Intellectual Property Crimes “copyright management information”). Section 1202 further prohibits intentionally facilitating infringement by knowingly distributing or importing for distribution (1) false copyright management information or (2) copyright management information knowing that such information has been removed or altered without authority. 17 U.S.C. § 1202(a)(2), (b)(2). Finally, § 1202 prohibits anyone from intentionally facilitating infringement by distributing, importing for distribution, or publicly performing copyrighted works, copies of works, or phonorecords knowing that their copyright management information has been removed or altered without authority. 17 U.S.C. § 1202(b)(3). Thus, while § 1201 primarily targets circumvention devices and technology, “Section 1202 imposes liability for specified acts. It does not address the question of liability for persons who manufacture devices or provide services.” H.R. Rep. No. 105-551 (I), at 22 (1998). Like § 1201, however, to establish a criminal violation of § 1202, the government must prove two elements in addition to those in the statute itself—that the defendant violated § 1202 both (1) willfully and (2) for purposes of commercial advantage or private gain. 17 U.S.C. § 1204(a). Criminal enforcement of § 1202 of the DMCA is rare, and prosecutors are encouraged to contact CCIPS at (202) 514-1026 for guidance when considering a charge under this provision. C. Defenses The DMCA provides for several statutory defenses, exceptions, and even “exemptions” to the anti-circumventing and anti-trafficking prohibitions set forth in 17 U.S.C. § 1201. As the following discussion demonstrates, these defenses do not apply uniformly to the anti-circumvention (§ 1201(a)(1)(A)) and anti-trafficking provisions (§ 1201(a)(2), (b)). 1. Statute of Limitations Section 1204(c) of the DMCA states that “[n]o criminal proceeding shall be brought under this section unless such proceeding is commenced within 5 years after the cause of action arose.” 17 U.S.C. § 1204(c). 2. Librarian of Congress Regulations The Librarian of Congress promulgates regulatory exemptions every three years that apply only to § 1201(a)(1)(A)’s prohibitions against circumventing access controls. See Section B.1.e. of this Chapter. V. Digital Milllenium Copyright Act 263 3. Certain Nonprofit Entities Section 1204(b) exempts from criminal prosecution all nonprofit libraries, archives, educational institutions, or public broadcasting entities as defined by 17 U.S.C. § 118(f ). See also 17 U.S.C. § 1201(d) (listing other entities). The exception set forth in § 1201(d) for nonprofit libraries, archives, and educational institutions is not as broad as the exemption from criminal prosecution for the same group of entities set forth in § 1204(b), because the latter (1) also includes “public broadcasting entities” and (2) precludes prosecution for the anti-circumvention and the anti-trafficking violations of § 1201. 4. Information Security Exemption “[A]ny lawfully authorized investigative, protective, information security, or intelligence activity of an officer, agent, or employee” or contractor of the federal government or a state government is exempt from all three of § 1201’s prohibitions for information security work on “a government computer, computer system, or computer network.” 17 U.S.C. § 1201(e). Congress intended that the term “computer system” would have the same meaning in § 1201(e) as it does in the Computer Security Act. H.R. Conf. Rep. No. 105796, at 66 (1998), reprinted in 1998 U.S.C.C.A.N. 639, 643. This exemption is narrower than it might first appear. Congress intended this exemption to permit law enforcement to lawfully disable technological protection measures protecting copyrighted works (e.g., measures protecting access to copyrighted computer software) to probe internal government computer systems to ensure that they are not vulnerable to hacking. Id. at 6566. Thus, “information security” consists of “activities carried out in order to identify and address the vulnerabilities of a government computer, computer system, or computer network.” 17 U.S.C. § 1201(e) (emphasis added); see also H.R. Conf. Rep. No. 105-796, at 8. 5. Reverse Engineering and Interoperability of Computer Programs Section 1201(f ) contains three reverse engineering or “interoperability” defenses for individuals using circumvention technology “‘for the sole purpose’ of trying to achieve ‘interoperability’ of computer programs through reverse engineering.” Davidson & Assocs. v. Jung, 422 F.3d 630, 641-42 (8th Cir. 2005) (quoting 17 U.S.C. §1201(f )). Note that at least one court has held that reverse engineering can satisfy the statutory fair use exception. Bowers v. Baystate Techs., Inc., 320 F.3d 1317, 1325 (Fed. Cir. 2003). 264 Prosecuting Intellectual Property Crimes The key term for these defenses, “interoperability,” “means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged.” 17 U.S.C. § 1201(f )(4). The scope of these exemptions is expressly limited to “computer programs” and does not authorize circumvention of access controls that protect other classes of copyrighted works, such as movies. Universal City Studios, Inc. v. Reimerdes, 82 F. Supp. 2d 211, 218 (S.D.N.Y. 2000). The first interoperability defense allows a person “who has lawfully obtained the right to use a copy of a computer program ... for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to th[at] person” to circumvent an access control without violating the DMCA’s anticircumvention prohibition set forth in § 1201(a)(1)(A). 17 U.S.C. § 1201(f ) (1). By definition, this exemption does not apply to one who obtains a copy of the computer program illegally. Second, § 1201(f )(2) exempts violations of the DMCA’s anti-trafficking provisions (§ 1201(a)(2), (b)) for those who “develop and employ technological means” that are “necessary” to enable interoperability. Despite the statute’s express requirement that this defense only applies “if such means are necessary to achieve such interoperability,” 17 U.S.C. § 1201(f )(2), at least one court has held that “the statute is silent about the degree to which the ‘technological means’ must be necessary, if indeed they must be necessary at all, for interoperability.” Lexmark Int’l, Inc. v. Static Control Components, Inc., 387 F.3d 522, 551 (6th Cir. 2004). Third, § 1201(f )(3) authorizes one who acquires information through § 1201(f )(1) to make this information and the technical means permitted under § 1201(f )(2) available to others “solely for the purpose of enabling interoperability of an independently created computer program with other programs.” 17 U.S.C. § 1201(f )(3). Significantly, § 1201(f )(3) “permits information acquired through reverse engineering to be made available to others only by the person who acquired the information.” Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 320 (S.D.N.Y. 2000), aff’d sub nom., Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001) (emphasis added). Consequently, one court disallowed this defense because, inter alia, the defendants “did not do any reverse engineering [themselves]. They simply took [the program] off someone else’s web site and posted it on their own.” Id. V. Digital Milllenium Copyright Act 265 None of these defenses apply if the defendant’s conduct also constituted copyright infringement or, in the case of the third defense, otherwise “violate[d] applicable law.” See 17 U.S.C. § 1201(f )(1)-(3); see also Lexmark, 387 F.3d at 551 (holding that defendant, which produced a computer chip that allowed a remanufactured printer cartridge to interoperate with another’s originally manufactured printer, did not commit infringement because the computer program that defendant had copied from plaintiff was not copyrighted). To establish a violation of the anti-trafficking provisions, prosecutors need not establish that the defendant’s motive for manufacturing or trafficking in a circumvention tool was to infringe or to permit or encourage others to infringe. See Reimerdes, 111 F. Supp. 2d at 319. In contrast, to determine whether defendants meet the interoperability exemption, prosecutors must determine whether the defendant’s motive for developing or trafficking the technological means for circumventing an access or copy control was “solely for the purpose” of achieving or enabling interoperability. Id. at 320. Courts strictly apply the requirement that circumvention and dissemination occur “solely for the purpose” of achieving interoperability and not to facilitate copyright infringement. For example, one court has held that circumventing a copyrighted computer game’s access controls for the purpose of developing and disseminating a copy or “emulator” that was essentially identical to the original but lacked the original’s access control, “constituted more than enabling interoperability” under § 1201(f )(1) and “extended into the realm of copyright infringement.” Davidson & Assocs., Inc. v. Internet Gateway, Inc., 334 F. Supp. 2d 1164, 1185-87 (E.D. Mo. 2004) (“The defendants’ purpose in developing the bnetd server was to avoid the anti-circumvention restrictions of the game and to avoid the restricted access to Battle.net. Thus, the sole purpose of the [] emulator was not to enable interoperability.”), aff’d, 422 F.3d at 642 (“Appellant’s circumvention in this case constitutes infringement.”); cf. Reimerdes, 111 F. Supp. 2d at 320 (holding that the purpose of [the defendant’s program] was simply to decrypt DVD access controls and not, as defendants claimed, to achieve interoperability between computers running Linux operating system because [the program] also could be used to decrypt and play DVDs on unlicensed players running the Windows operating system). In addition, where the development (or distribution to the public) of circumvention technology itself constitutes copyright infringement, the DMCA expressly precludes reliance on § 1201(f )(2) and (3). See id. (holding that “[t]he right to make the information available extends only to dissemination ‘solely for the purpose’ of 266 Prosecuting Intellectual Property Crimes achieving interoperability as defined in the statute. It does not apply to public dissemination of means of circumvention”) (footnote omitted). Moreover, legislative history suggests that the “independently created [computer] program” referenced in this exemption must not infringe the original computer program and instead must be “a new and original work.” H.R. Rep. No. 105-551 (II), at 42 (1998). Thus, if the defendant’s functionally equivalent computer program is “new and original” only insofar as it lacks the original’s access controls, then the defendant has not created an “independently created computer program.” Davidson, 334 F. Supp. 2d at 1185, aff’d, 422 F.3d at 642. If, on the other hand, the defendant’s program actually performs functions that the original program did not, courts are more inclined to find that defendants have satisfied the “independently created computer program” requirement. Lexmark, 387 F.3d at 550 (holding that even though remanufacturer’s toner cartridge chip contained “exact copies” of original manufacturer’s computer program, it was nonetheless an “independently created computer program” because it “contain[s] other functional computer programs beyond the copied” original program). The independent program need not have already existed before the defendant reverse-engineered the original program. Id. at 55051 (holding that “nothing in the statute precludes simultaneous creation of an interoperability device and another computer program” so long as it is “‘independently’ created”). 6. Encryption Research Certain encryption research is exempted from liability under § 1201(a) (but not from § 1201(b)). Reimerdes, 111 F. Supp. 2d at 321 n.154. For purposes of this exemption, “encryption research” consists of “activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works, if these activities are conducted to advance the state of knowledge in the field of encryption technology or to assist in the development of encryption products.” 17 U.S.C. § 1201(g)(1)(A). The phrase, “encryption technologies,” “means the scrambling and descrambling of information using mathematical formulas or algorithms.” 17 U.S.C. § 1201(g)(1)(B). The first encryption research exemption is that it is not a violation of the anti-circumvention provision (§ 1201(a)(1)(A)) where a defendant “circumvent[s] a technological measure as applied to a copy, phonorecord, performance, or display of a published work in the course of an act of good faith encryption research if ” four conditions are satisfied: (1) he “lawfully V. Digital Milllenium Copyright Act 267 obtained” the applicable encrypted published work; (2) the circumvention “is necessary to conduct such encryption research;” (3) he “made a good faith effort to obtain authorization before the circumvention;” and (4) the circumvention does not constitute copyright infringement “or a violation of applicable law,” including the Computer Fraud Abuse Act of 1986, 18 U.S.C. § 1030. 17 U.S.C. § 1201(g)(2). To determine whether a defendant qualifies for this exemption, courts consider the following non-exclusive factors: (1) whether the results of the putative encryption research are disseminated in a manner designed to advance the state of knowledge of encryption technology versus facilitation of copyright infringement; (2) whether the person in question is engaged in legitimate study of or work in encryption; and (3) whether the results of the research are communicated in a timely fashion to the copyright owner. 17 U.S.C. § 1201(g) (3); see also Reimerdes, 111 F. Supp. 2d at 321. The second encryption research exemption is that a defendant does not violate the access control anti-trafficking provision (§ 1201(a)(2)) for developing and distributing tools, such as software, that are needed to conduct permissible encryption research as described in the first encryption research exemption in § 1201(g)(2). 17 U.S.C. § 1201(g)(4); H.R. Rep. No. 105-551 (II), at 44 (1998). This exemption essentially frees an encryption researcher to cooperate with other researchers, and it also allows one researcher to provide the technological means for such research to another to verify the research results. Id. It is not a violation of § 1201(a)(2) for a person to (1) “develop and employ technological means to circumvent a technological measure for the sole purpose of that person performing the acts of good faith encryption research described in” § 1201(g)(2) and (2) “provide the technological means to another person with whom he or she is working collaboratively” for the purpose of either conducting good faith encryption research or having another person verify such research as described in § 1201(g)(2). 17 U.S.C. § 1201(g)(4). This exemption is quite complex and has been relied upon infrequently in reported decisions. For a report on the early effects of this exemption (or lack thereof ) on encryption research and on protection of content owners against unauthorized access of their encrypted copyrighted works, see the “Report to Congress: Joint Study of Section 1201(g) of The Digital Millennium Copyright Act” prepared by the U.S. Copyright Office and the National Telecommunications 268 Prosecuting Intellectual Property Crimes and Information Administration of the Department of Commerce pursuant to § 1201(g)(5), available at http://www.copyright.gov/reports/studies/dmca_ report.html. 7. Restricting Minors’ Access to the Internet Section 1201(h) creates a discretionary exception, giving the court discretion to waive violations of § 1201(a)(1)(A) and 1201(a)(2) so that those prohibitions are not applied in a way that “inadvertently make[s] it unlawful for parents to protect their children from pornography and other inappropriate material available on the Internet, or have unintended legal consequences for manufacturers of products designed solely to enable parents to protect their children.” H.R. Rep. No. 105-551 (II), at 45 (1998). Specifically, § 1201(h) authorizes the court to “consider the necessity for its intended and actual incorporation in a technology, product, service, or device, which (1) does not itself violate the provisions of this title; and (2) has the sole purpose to prevent the access of minors to material on the Internet.” 17 U.S.C. § 1201(h). Congress was concerned that if Internet filtering tools are developed in the future that incorporate a part or component that circumvent access controls to a copyrighted work “solely in order to provide a parent with the information necessary to ascertain whether that material is appropriate for his or her child, this provision authorizes a court to take into consideration the necessity for incorporating such part or component in a suit alleging a violation of section 1201(a).” S. Rep. No. 105-190, at 14 (1998). To date, no reported case has applied this discretionary exception. 8. Protection of Personally Identifying Information Section 1201(i)(1) states that it is not a violation of § 1201(a)(1)(A) to circumvent an access control for the purpose of disabling files that collect personally identifiable information like “‘cookie files’—which are automatically deposited on hard drives of computers of users who visit World Wide Web sites.” Id. at 18. However, if a copyright owner conspicuously discloses that its access control also contains personal data gathering capability, and if the consumer is given the ability to effectively prohibit that gathering or dissemination of personal information, then this exception does not apply and no circumvention is permitted. H.R. Rep. No. 105-551 (II), at 45 (1998). Further, if the copyright owner conspicuously discloses that neither the access control nor the work it protects collect personally identifying information, V. Digital Milllenium Copyright Act 269 then no circumvention is permitted. 17 U.S.C. § 1201(i)(2). Note that this exception does not apply to the anti-trafficking prohibitions. 9. Security Testing A person who engages in good faith “security testing” does not violate § 1201(a). 17 U.S.C. § 1201(j). “Security testing” consists of “accessing a computer, computer system, or computer network, solely for the purpose of good faith testing, investigating, or correcting, a security flaw or vulnerability, with the authorization of the owner or operator of such computer, computer system, or computer network.” 17 U.S.C. § 1201(j)(1). Without such authorization, a defendant cannot qualify for this exemption. Reimerdes, 111 F. Supp. 2d at 321. A defendant engaging in security testing does not violate § 1201(a)(1) (A) so long as such testing does not constitute copyright infringement nor a violation of other applicable law such as the Computer Fraud and Abuse Act of 1986. 17 U.S.C. § 1201(j)(2). In evaluating this exemption, the DMCA requires a court to consider whether the information derived from the security testing (1) “was used solely to promote the security of the owner or operator of [or shared directly with the developer of ] such computer, computer system or computer network, or” (2) “was used or maintained in a manner that does not facilitate [copyright] infringement” or a violation of other applicable law. 17 U.S.C. § 1201(j)(3). Likewise, a defendant does not violate § 1201(a)(2) for trafficking in a “technological means for the sole purpose of performing the acts of security testing” if the testing does not “otherwise violate section (a)(2).” 17 U.S.C. § 1201(j)(4). 10. Constitutionality of the DMCA Civil and criminal defendants have repeatedly challenged the constitutionality of Title I of the DMCA, particularly 17 U.S.C. § 1201(a) (2) and 1201(b). Defendants have repeatedly challenged Congress’s authority, for example, to enact the DMCA pursuant to the Commerce Clause and Intellectual Property Clause. None of these challenges has yet prevailed. a. Congress’s Constitutional Authority to Enact § 1201 of the DMCA Congress enacted § 1201 pursuant to its authority under the Commerce Clause. See U.S. Const., art. I, § 8, cl. 3; H.R. Rep. No. 105-551 (II), at 22, 35 (1998). Federal courts have uniformly upheld this authority. See, e.g., United 270 Prosecuting Intellectual Property Crimes States v. Elcom Ltd., 203 F. Supp. 2d 1111, 1138 (N.D. Cal. 2002) (“Congress plainly has the power to enact the DMCA under the Commerce Clause.”); 321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, 1103 (N.D. Cal. 2004) (same). Article I, Section 8, Clause 3 of the Constitution delegates to Congress the power “[t]o regulate Commerce with foreign Nations, and among the several States, and with the Indian Tribes.” Congress does not exceed its Commerce Clause authority where a rational basis exists “for concluding that a regulated activity sufficiently affected interstate commerce.” United States v. Lopez, 514 U.S. 549, 558 (1995) (citations omitted). The DMCA prohibits circumventing access controls and the trafficking in technology that facilitates circumvention of access or copy controls—the type of conduct that has a substantial effect on commerce between the states and commerce with foreign nations. See 321 Studios, 307 F. Supp. 2d at 1103. Congress created the DMCA’s anti-trafficking prohibitions to directly regulate specific items moving in commerce (circumvention technology) and to protect channels of interstate commerce, including electronic commerce. H.R. Rep. No. 105-551(II), at 22 (1998). Most significantly, to the extent that circumvention devices enable criminals to engage in piracy by unlawfully copying and distributing copyrighted works, the sale of such devices has a direct effect on suppressing the market for legitimate copies of the works. See 321 Studios, 307 F. Supp. 2d at 1103; Elcom, 203 F. Supp. 2d at 1138. Accordingly, Congress had a rational basis for concluding that § 1201 regulates activity that substantially affects interstate commerce and therefore acted within its authority under the Commerce Clause. See Elcom, 203 F. Supp. 2d at 1138. Courts have similarly rejected the argument that the DMCA violates the Intellectual Property Clause. The Commerce Clause authorizes Congress to enact legislation that protects intellectual property rights, even where the Intellectual Property Clause alone does not provide sufficient authority for such legislation. Federal courts have long recognized that while each of the powers of Congress is alternative to all of the others, “what cannot be done under one of them may very well be doable under another.” United States v. Moghadam, 175 F.3d 1269, 1277 (11th Cir. 1999). Congress may thus use the Commerce Clause as a basis for legislating within a context contemplated by another section of the Constitution (like the Intellectual Property Clause) so long as Congress does not override an otherwise existing Constitutional limitation. Id. (holding the criminal anti-bootlegging statute, 18 U.S.C. § 2319A, valid under the Commerce Clause even if it is beyond Congress’s authority under the Intellectual Property Clause); compare Heart of Atlanta Motel v. United V. Digital Milllenium Copyright Act 271 States, 379 U.S. 241 (1964) (upholding public accommodation provisions of the Civil Rights Act of 1964 as valid under the Commerce Clause despite the fact that the Act may have reached beyond Congress’s authority under the Fourteenth Amendment), and South Dakota v. Dole, 483 U.S. 203, 207 (1987) (holding that Congress could rely on the Spending Clause to impose restrictions that would otherwise exceed Congress’s power), with Railway Labor Executives’ Ass’n v. Gibbons, 455 U.S. 457 (1982) (striking down act by Congress under Commerce Clause that violated Bankruptcy Clause’s uniformity requirement). Further, the Intellectual Property Clause “itself is stated in positive terms, and does not imply any negative pregnant” that would suggest “a ceiling on Congress’ ability to legislate pursuant to other grants.” Moghadam, 175 F.3d at 1280 (discussing constitutionality of the criminal anti-bootlegging statute, 18 U.S.C. § 2319A). Moreover, “[e]xtending quasi-copyright protection also furthers the purpose of the Copyright Clause to promote the progress of the useful arts.” Id. The DMCA’s enactment pursuant to the Commerce Clause was valid because it “is not fundamentally inconsistent with” the purpose of the Intellectual Property Clause. Elcom, 203 F. Supp. 2d at 1139-41. Indeed, Congress “viewed the [DMCA] legislation as ‘paracopyright’ legislation that could be enacted under the Commerce Clause.” Id. at 1140. Moreover, protecting copyright owners’ rights against unlawful piracy by preventing trafficking in tools that would enable widespread piracy and unlawful infringement (i.e., circumvention tools) is consistent with the Intellectual Property Clause’s grant to Congress of the power to “‘promote the useful arts and sciences’ by granting exclusive rights to authors in their writings.” Id. Specifically, courts have rejected the common argument that the DMCA’s ban on the sale of circumvention tools violates the Intellectual Property Clause’s “limited Times” prohibition. That argument is based on the false premise that the DMCA has the effect of allowing publishers to claim copyright-like protection in copyrighted works, even after they pass into the public domain. Prosecutors should vigorously oppose this flawed argument. Nothing in the DMCA permits a copyright owner to prevent his work from entering the public domain, despite the expiration of the copyright. Id. at 1141. As discussed in the copyright chapter, the essence of copyright is the legally enforceable exclusive right to reproduce and distribute copies of an original work of authorship, to make derivative works, and to perform the work publicly for a limited time. See supra Chapter II; see also Elcom, 203 F. Supp. 2d at 1141; 17 U.S.C. §§ 106, 272 Prosecuting Intellectual Property Crimes 302, 303. When a copyright expires, so does any protectable intellectual property right in a work’s expression. Elcom, 203 F. Supp. 2d at 1141. Upon expiration, the user may copy, quote, or republish the expression without any legally enforceable restriction on the use of the expression. Id. “Nothing within the DMCA grants any rights to anyone in any public domain work. A public domain work remains in the public domain[,] and any person may make use of the public domain work for any purpose.” 321 Studios, 307 F. Supp. 2d at 1104 (internal quotation marks and citation omitted). Accordingly, the DMCA does not extend any copyright protections beyond the statutory copyright term merely by prohibiting the trafficking in or marketing of circumvention technology. Id. b. The First Amendment Criminal and civil DMCA defendants have raised both facial and “as applied” First Amendment challenges. Although federal courts have uniformly rejected such challenges, defendants continue to raise them in part because the overbreadth and “as applied” First Amendment tests each can include a factdependent component. i. Facial Challenges Facial First Amendment challenges to § 1201—typically alleging that the statute is unconstitutionally overbroad—fail for at least two reasons. First, the DMCA does not expressly proscribe spoken words or patently expressive or communicative conduct. See Roulette v. City of Seattle, 97 F.3d 300, 303 (9th Cir. 1996). “[A] facial freedom of speech attack must fail unless, at a minimum, the challenged statute is directed narrowly and specifically at expression or conduct commonly associated with expression.” Id. at 305 (citations and internal quotation marks omitted); see also Virginia v. Hicks, 539 U.S. 113, 123 (2003). Section 1201 of the DMCA, “[b]y its terms,” is not directed at expression or conduct associated with expression. Elcom, 203 F. Supp. 2d at 1133. Instead, § 1201 is a law of general application focused on the circumvention of access controls and the trafficking in circumvention tools; § 1201’s prohibitions are not focused on speech. Id.; see also Anderson v. Nidorf, 26 F.3d 100, 103-04 (9th Cir. 1994) (holding that California’s anti-piracy statute is not subject to facial challenge because, inter alia, the statute focused upon infringement for commercial advantage or private financial gain). Accordingly, on this basis V. Digital Milllenium Copyright Act 273 alone, “an overbreadth facial challenge [to § 1201] is not available.” Elcom, 203 F. Supp. 2d at 1133. Second, even were the DMCA directed at spoken words or expressive conduct—which no court has yet held—such a finding would be insufficient to establish overbreadth as a matter of law. The defendant would still have to independently establish that the DMCA is written so broadly that it infringes unacceptably on the First Amendment rights of third parties. City Council v. Taxpayers for Vincent, 466 U.S. 789, 798-99 (1984). The overbreadth doctrine “is, manifestly, strong medicine,” to be employed “sparingly and only as a last resort.” Broadrick v. Oklahoma, 413 U.S. 601, 613 (1973). For this reason, a statute will be declared facially unconstitutional for overbreadth only if the court finds a realistic danger that the statute itself will significantly compromise recognized First Amendment protections of parties not before the court. See New York State Club Ass’n, Inc. v. City of New York, 487 U.S. 1, 11 (1988). The DMCA neither compromises a recognized First Amendment protection of third parties, nor is there a realistic danger that such a compromise would occur. Moreover, § 1201’s “plainly legitimate sweep” targets circumvention of access controls and the manufacture or trafficking in circumvention technology, not speech. Thus, it is highly unlikely that defendants could establish the facts necessary to claim that § 1201 is overbroad. See Elcom, 203 F. Supp. 2d at 1133. ii. “As Applied” Challenges First Amendment “as applied” challenges to § 1201 necessarily vary according to the technology at issue in each defendant’s particular case. DMCA defendants have often alleged that the DMCA violates the First Amendment when applied to circumvention technology in the form of computer code. Although it is arguable whether computer object code constitutes speech, every federal court that has held that computer code is speech has nonetheless ruled that the anti-trafficking provisions do not violate the First Amendment under an intermediate scrutiny standard because the DMCA (1) is contentneutral; (2) furthers important governmental interests in promoting electronic commerce and protecting the rights of copyright owners; and (3) is sufficiently tailored to achieve these objectives without unduly burdening free speech. See, e.g., Elcom, 203 F. Supp. 2d at 1126-28 (applying United States v. O’Brien, 391 U.S. 367, 376 (1968) (“When ‘speech’ and ‘nonspeech’ elements are combined in the same course of conduct, a sufficiently important governmental interest 274 Prosecuting Intellectual Property Crimes in regulating the nonspeech element can justify incidental limitations on First Amendment freedoms.”)). The DMCA’s anti-trafficking provisions are content neutral. See Universal City Studios, Inc. v. Corley, 273 F.3d 429, 454 (2d Cir. 2001) (§ 1201(a)(2)); 321 Studios, 307 F. Supp. 2d at 1100 (§ 1201(a)(2) and 1201(b)); Elcom, 203 F. Supp. 2d at 1128-29 (§ 1201(b)). The principal inquiry in determining whether a statute is content neutral is “‘whether the government has adopted a regulation of speech because of [agreement or] disagreement with the message it conveys.’” Turner Broad. Sys., Inc. v. FCC, 512 U.S. 622, 642 (1994) (quoting Ward v. Rock Against Racism, 491 U.S. 781, 791 (1989)). The government’s purpose is the controlling measure. Id. By this measure, the DMCA’s anti-trafficking provisions are clearly content-neutral. Congress intended the DMCA to target the non-speech, functional components of circumvention technology, Corley, 273 F.3d at 454, not to “stifle[] speech on account of its message.” Turner, 512 U.S. at 641. The DMCA is not a content-based statute that would require strict scrutiny under the First Amendment. See 321 Studios, 307 F. Supp. 2d at 1100. In fact, “[t]he reason that Congress enacted the anti-trafficking provision of the DMCA had nothing to do with suppressing particular ideas of computer programmers and everything to do with functionality.” Universal City Studios, Inc. v. Reimerdes, 111 F. Supp. 2d 294, 329 (S.D.N.Y. 2000), aff’d sub nom. Universal City Studios, Inc. v. Corley, 273 F.3d 429 (2d Cir. 2001). Ultimately, the DMCA is not concerned with whatever capacity circumvention technology might have for conveying information to a person, and that capacity is what arguably creates the speech component of, for example, decrypting computer code. See Corley, 273 F.3d at 454. The DMCA would apply to such code solely because of its capacity to decrypt, for instance, an access control. Id. “That functional capability is not speech within the meaning of the First Amendment.” Id. A statute that is content neutral is subject to intermediate scrutiny and hence satisfies the First Amendment “if it furthers an important or substantial government interest; if the government interest is unrelated to the suppression of free expression; and if the incidental restriction on alleged First Amendment freedoms is no greater than is essential to the furtherance of that interest.” Turner, 512 U.S. at 662 (quotation and citation omitted). The government’s interest in preventing unauthorized copying of copyrighted works and V. Digital Milllenium Copyright Act 275 promoting electronic commerce are unquestionably substantial. See H.R. Rep. No. 105-551 (II), at 23 (1998); Elcom, 203 F. Supp. 2d at 1129-30; Corley, 273 F.3d at 454. Congress enacted the DMCA after evaluating a great deal of evidence establishing that copyright and intellectual property piracy are endemic, especially digital piracy. See S. Rep. No. 105-190, at 8 (1998). Thus, by prohibiting circumvention of access controls and the trafficking in circumvention technology, “the DMCA does not burden substantially more speech than is necessary to achieve the government’s asserted goals of promoting electronic commerce, protecting copyrights, and preventing electronic piracy.” See 321 Studios, 307 F. Supp. 2d at 1103 (internal quotation marks and citation omitted). Finally, courts have uniformly found that the DMCA’s anti-trafficking provisions meet the Supreme Court’s narrow tailoring requirement that a content-neutral regulation of speech promote a substantial government interest that would be achieved less effectively absent the regulation. See id. at 1101. The DMCA’s numerous exceptions (see Section C. of this Chapter) further demonstrate that Congress narrowly tailored the statute to balance, for instance, the needs of law enforcement, computer programmers, encryption researchers, and computer security specialists against the problems created by circumvention technology. See 17 U.S.C. § 1201(e)-(g), (j); Elcom, 203 F. Supp. 2d at 1130-31. c. Vagueness Courts have also rejected challenges to the DMCA under the Fifth Amendment on vagueness grounds. Vagueness may invalidate a statute if the statute either (1) fails to provide the kind of notice that will enable ordinary people to understand what conduct it prohibits, or (2) authorizes or encourages arbitrary and discriminatory enforcement. City of Chicago v. Morales, 527 U.S. 41, 56 (1999). Defendants typically argue that the DMCA is vague or otherwise infirm because it bans only those circumvention tools that are primarily designed to circumvent access or copy controls to enable copyright infringement, not those enabling fair uses. See, e.g., Elcom, 203 F. Supp. 2d at 1122. This issue has arisen with respect to § 1201(b), which prohibits trafficking in any copy control circumvention technology. Id. at 1124. Courts have held, however, that the DMCA is not unconstitutionally vague, because it imposes a blanket ban on all circumvention tools regardless of whether the ultimate purpose for their use is fair or infringing. Id. “Congress 276 Prosecuting Intellectual Property Crimes thus recognized that most uses of tools to circumvent copy restrictions would be for unlawful infringement purposes rather than for fair use purposes and sought to ban all circumvention tools that ‘can be used’ to bypass or avoid copy restrictions.” Id. at 1125 (quoting S. Rep. No. 105-190, at 29-30). Moreover, Congress’s intent to preserve fair use, see § 1201(c), is not inconsistent with a ban on trafficking in circumvention technologies, even those that could be used for fair use purposes rather than infringement. Elcom, 203 F. Supp. 2d at 1125. Although the DMCA may make certain fair uses in digital works more difficult, the DMCA does not eliminate fair use and in fact expressly permits it. See Elcom, 203 F. Supp. 2d at 1125; 17 U.S.C. § 1201(c)(1). “Thus, while it is not unlawful to circumvent for the purpose of engaging in fair use, it is unlawful to traffic in tools that allow fair use circumvention.” Elcom, 203 F. Supp. 2d at 1125. Further, because the DMCA prohibits the trafficking of all circumvention tools, Congress need not expressly tie the use of the tool to an unlawful purpose (as may be required, for instance, in a multiuse device context). Id. Accordingly, the DMCA, “as written, allows a person to conform his or her conduct to a comprehensible standard and is thus not unconstitutionally vague.” Id. (citation omitted). d. Fair Use For a more detailed explanation of the fair use doctrine, see Section C.5. of Chapter II of this Manual. Defendants typically style their fair use defense to a DMCA violation as an “as applied” First Amendment challenge. For example, traffickers have raised fair use challenges “as applied” to the First Amendment rights of third-party purchasers of the trafficker’s circumvention tools. This type of fair use defense fails for at least three reasons. First, the challengers usually lack standing. “[A] person to whom a statute may constitutionally be applied will not be heard to challenge that statute on the ground that it may conceivably be applied unconstitutionally to others, in other situations not before the Court.” Broadrick v. Oklahoma, 413 U.S. 601, 610 (1973). Those who traffic in circumvention tools that they do not use cannot assert a fair use defense because they are not engaging in any use—fair or infringing—of a copyrighted work. Simply put, traffickers lack standing to challenge the DMCA’s constitutionality based on its application to the traffickers’ customers. Second, even a purchaser who could have standing because he did use a copyrighted work cannot rely on the fair use defense, because the DMCA does V. Digital Milllenium Copyright Act 277 not present an issue of infringement. Fair use is an affirmative defense to copyright infringement, something that the user can accomplish only after he has first circumvented a work’s copy controls. See, e.g., Elcom, 203 F. Supp. 2d at 1121. The DMCA “targets the circumvention of digital walls guarding copyrighted material (and trafficking in circumvention tools), [it] does not concern itself with the use of those materials after circumvention has occurred.” Corley, 273 F.3d at 443; United States v. Crippen, No. CR09-703PSG, 2010 WL 7198205, at *2 (C.D. Cal. Nov. 23, 2010) (same) (granting the government’s motion in limine to exclude evidence of fair use at trial where defendant was charged with DMCA violations for modifying Microsoft Xbox gaming systems); see also MGE UPS Sys., Inc. v. GE Consumer and Ind., Inc., 622 F.3d 361, 366 (5th Cir. 2010) (“Because § 1201(a)(1) is targeted at circumvention, it does not apply to the use of copyrighted works after the technological measure has been circumvented.”). Thus, the DMCA’s anti-trafficking provisions are not concerned with purchasers’ downstream use of circumvention tools. See Corley, 273 F.3d at 442; Realnetworks, Inc. v. DVD Copy Control Ass’n, 641 F. Supp. 2d 913, 943-44 (N.D. Cal. 2009); 321 Studios, 307 F. Supp. 2d at 1097-98. Third, no court has held that the fair use doctrine is a categorical constitutional requirement. Corley, 273 F.3d at 458 (“[T]he Supreme Court has never held that fair use is constitutionally required.”). Fair use is a judiciallycreated doctrine. Reimerdes, 111 F. Supp. 2d at 321. Fair use existed only at common law until Congress codified it in the 1976 Copyright Act at 17 U.S.C. § 107, in order to maintain the common-law status quo. See H.R. Rep. No. 94-1476, at 66 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5680. The fact that the fair use doctrine accommodates First Amendment protections—i.e., that certain fair uses may also be protected under the First Amendment, cf. Eldred v. Ashcroft, 537 U.S. 186, 218-20 (2003); Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 560 (1985)—does not make the fair use doctrine and the First Amendment categorically coextensive. See Elcom, 203 F. Supp. 2d at 1134 n.4 (“[There] is no direct authority for the proposition that the doctrine of fair use is coextensive with the First Amendment, such that ‘fair use’ is a First Amendment right”). Most significantly, courts have rejected “the proposition that fair use, as protected by the Copyright Act, much less the Constitution, guarantees copying by the optimum method or in the identical format of the original.” Corley, 273 F.3d at 459. Fair use of copyrighted digital works is still possible under the 278 Prosecuting Intellectual Property Crimes DMCA, even though copying of such works may prove more difficult. 321 Studios, 307 F. Supp. 2d at 1102. In addition, the DMCA does not place an impermissible financial burden on fair users’ First Amendment rights. Courts have found that this “financial burden” argument “is both an overstatement of the extent of the fair use doctrine and a misstatement of First Amendment law.” Id. A statute’s financial burden on a speaker renders the statute unconstitutional only if such burden was placed on the speaker because of the speech’s content, not because of the speaker’s desire to make the speech. Id. (citations omitted). Section 1201 of the DMCA does not eliminate fair use nor prevent anyone from engaging in traditional methods of fair use such as “quoting from a work or comparing texts for the purpose of study or criticism.” Elcom, 203 F. Supp. 2d at 1134. Finally, courts have rejected the argument that the DMCA impairs an alleged First Amendment fair use right to access non-copyrighted works in the public domain, because the DMCA permits authors to use access and copy controls to protect non-copyrighted works and copyrighted works alike. See, e.g., 321 Studios, 307 F. Supp. 2d at 1102; Elcom, 203 F. Supp. 2d at 1134. Neither the DMCA nor the presence of access or copy controls affect whether or not a work is in the public domain. 321 Studios, 307 F. Supp. 2d at 1102. D. Penalties For the first criminal violation of Title I of the DMCA (§§ 1201, 1202), the maximum penalty is five years’ imprisonment, a $500,000 fine or twice the monetary gain or loss, or both imprisonment and a fine. 17 U.S.C. §§ 1204, 3571(d). For subsequent offenses, the maximum penalty is ten years’ imprisonment, a $1 million fine or twice the monetary gain or loss, or both imprisonment and a fine. Id. For a more complete discussion of sentencing issues, see Chapter VIII of this Manual. V. Digital Milllenium Copyright Act 279 280 Prosecuting Intellectual Property Crimes VI. Counterfeit and Illicit Labels, Counterfeit Documentation and Packaging—18 U.S.C. § 2318 A. Distinguished from Trademark and Copyright Statutes Creative works can be protected by criminal laws other than the Copyright Act. The most important of these is 18 U.S.C. § 2318, which criminalizes knowingly trafficking in counterfeit or illicit labels and counterfeit documentation and packaging for certain types of copyrighted works. Although § 2318 regulates items that accompany copyrighted works, it is not a pure copyright statute, and its protections differ in scope from those afforded by the Copyright Act. Section 2318 also differs from civil and criminal trademark law. Although counterfeit and illicit labels, documentation, and packaging often bear counterfeit trademarks (trafficking in which is prohibited by the criminal trademark statute, 18 U.S.C. § 2320), the use of a counterfeit mark is not an element of a § 2318 offense. Section 2318 also differs from § 2320 in the types of labels and packaging covered by each statute. Section 2320 criminalizes trafficking of labels and related labeling components bearing counterfeit trademarks, where such labels are used, designed, or intended to be used with any types of good or service, whereas § 2318 covers only counterfeit labels (as well as documentation and packaging) in connection with certain classes of copyrighted works. Section 2318 originally addressed counterfeit labels for sound recordings, but has evolved over time to address counterfeit labels, documentation, and packaging for a broader class of copyrighted works. See Sections B.3., B.4., and E.5. of this Chapter. As a result of 2004 amendments, § 2318 now prohibits trafficking in counterfeit labels for movies, music, software, copies of literary, pictorial, graphic, or sculptural works, or works of visual art, or labels designed 281 to be used with documentation and packaging for any of the enumerated classes of copyrighted works. 18 U.S.C. § 2318(a)(1)(A). Section 2318 also prohibits trafficking in counterfeit documentation and packaging for the classes of works listed above. 18 U.S.C. § 2318(a)(1)(B). In 2006, Congress further expanded § 2318 to address trafficking in what are known as “illicit” labels, which are “genuine certificate[s], licensing document[s], registration card[s], or similar labeling component[s]” that the copyright owner would normally use to verify that a work is noninfringing (i.e., legitimate), but which are distributed or intended for distribution without the owner’s permission, presumably to facilitate infringement. 18 U.S.C. § 2318(b)(4). In 2008, the PRO-IP Act revised § 2318’s restitution provision to refer to 18 U.S.C. § 2323, the general forfeiture and restitution provision for IP offenses also created by the PRO-IP Act. 18 U.S.C. § 2318(d). The PRO-IP Act also renumbered the subsections within § 2318(a). Sample indictments and jury instructions are provided in Appendix F of this Manual. B. Elements To obtain a conviction under 18 U.S.C. § 2318, the government must prove five elements: 1. The defendant acted knowingly 2. The defendant trafficked 3. In labels affixed to, enclosing, or accompanying (or designed to be affixed to, enclose, or accompany) a phonorecord, computer program, motion picture or other audiovisual work, literary, pictorial, graphic, or sculptural work, or work of visual art, or documentation or packaging for such works (i.e., trafficked either in documentation or packaging for such works itself, or in labels for such documentation or packaging) 4. The documentation or packaging were counterfeit, or the labels were counterfeit or illicit 5. Federal jurisdiction is satisfied because: a. the offense occurred in special maritime territories or other areas of special jurisdiction of the United States; b. the offense used or intended to use the mail or a facility of interstate or foreign commerce; 282 Prosecuting Intellectual Property Crimes c. the counterfeit or illicit labels were affixed to, enclosed, or accompanied copyrighted materials (or were designed to); or d. the documentation or packaging is copyrighted. These elements are reviewed in detail in the following sections. 1. The Defendant Acted “Knowingly” Section 2318 is a general intent crime. The government must prove first that the defendant acted “knowingly.” This is less difficult than proving that the defendant acted willfully, as with criminal copyright cases. See Chapter II, Section B.2. of this Manual for a discussion of the “willful” standard in criminal copyright infringement cases. Proving knowledge under § 2318 requires the government to show only that the defendant knew that he was taking the actions described in the statute. The government does not have to show that the defendant knew his conduct was illegal. See Bryan v. United States, 524 U.S. 184, 193 (1998) (firearms offense) (“‘[K]nowingly’ merely requires proof of knowledge of the facts that constitute the offense.”). To establish knowledge in § 2318 cases involving counterfeit labels, the government does not have to prove that the defendant acted with fraudulent intent. Congress eliminated that element in 1982, believing that such proof was “superfluous” because the government must already prove that the defendant knew his labels were counterfeit. S. Rep. No. 97-274, at 9 (1981), reprinted in 1982 U.S.C.C.A.N. 127, 135 (“In other words, it would be difficult to conceive of a situation in which one could traffic in articles knowing that they are counterfeit without intending to defraud the purchaser.”). It is less clear whether, and to what extent, a requirement of fraudulent intent may be assumed in cases involving illicit labels, but the statute does not expressly require such proof. Nonetheless, the government must prove that the defendant knew that the labels, documentation, or packaging in which he trafficked were counterfeit or illicit. See, e.g., United States v. Teh, 535 F.3d 511, 519-20 (6th Cir. 2008); United States v. Dixon, No. 84-5287, 1985 U.S. App. LEXIS 27076, at *911 (4th Cir. Aug. 12, 1985); see also Microsoft Corp. v. Pronet Cyber Techs., Inc., 593 F.Supp.2d 876, 884 (E.D. Va. 2009) (“[Section] 2318’s legislative history suggests that Congress was well aware that the amended statute only required proof of knowledge that labels were counterfeit—namely, that the labels appeared to be genuine, but were not.”). It may also suffice to prove that the defendant was willfully blind to the fact that the items trafficked were counterfeit or illicit. Although no published VI. Counterfeit and Illicit Labels 283 cases specify that the government may satisfy § 2318 through proof of willful blindness (also known as “conscious avoidance” or deliberate ignorance), courts have held that proving willful blindness generally suffices to prove knowledge in criminal cases. See United States v. Jewell, 532 F.2d 697, 699-704 (9th Cir. 1976) (discussing the history and use of “deliberate ignorance” instructions); Microsoft Corp. v. Compusource Distribs., Inc., 115 F. Supp. 2d 800, 808-09 (E.D. Mich. 2000) (citing evidence of defendant’s willful blindness as to authenticity of software as supporting finding that he knew software was counterfeit); see also Deborah Sprenger, Propriety of Instruction of Jury on “Conscious Avoidance” of Knowledge of Nature of Substance or Transaction in Prosecution for Possession or Distribution of Drugs, 109 A.L.R. Fed. 710 § 2[a] (2005). “The knowledge element of a crime such as the one charged here may be satisfied upon a showing beyond a reasonable doubt that a defendant had actual knowledge or deliberately closed his eyes to what otherwise would have been obvious to him concerning the fact in question.” United States v. Brodie, 403 F.3d 123, 148 (3d Cir. 2005) (internal quotation marks and citation omitted) (Trading with the Enemy Act of 1917 and Cuban Assets Control Regulations violations). Willful blindness goes beyond negligence: the defendant himself must have been “objectively aware of the high probability of the fact in question, and not merely that a reasonable man would have been aware of the probability.” Id. (internal quotation marks and citation omitted). The government need not prove that the defendant knew that his conduct met the jurisdictional elements listed in § 2318(c), such as that the computer program to which he had affixed his counterfeit labels was copyrighted. See Section B.5. of this Chapter. 2. The Defendant Trafficked In the second element of a § 2318 offense, the government must prove that the defendant trafficked in labels, documentation, or packaging. The term “traffic” in § 2318 is defined by reference to the definition of “traffic” used in § 2320. See 18 U.S.C § 2320(f )(5) (“the term ‘traffic’ means to transport, transfer, or otherwise dispose of, to another, for purposes of commercial advantage or private financial gain, or to make, import, export, obtain control of, or possess, with intent to so transport, transfer, or otherwise dispose of.”). See also Chapter III, Section B.3. of this Manual for a discussion of the term “traffic” as an element of a § 2320 offense. The only difference to note between the application of the term traffic in § 2318 and § 2320 is that § 2320 punishes attempts whereas § 2318 does not, and therefore any discussion of attempted 284 Prosecuting Intellectual Property Crimes trafficking with regard to § 2320 may not apply to § 2318. On the other hand, because the definition of “traffic” in both statutes includes many acts that are preparatory to distributing contraband—such as making it, obtaining it, and possessing it with intent to traffic—the omission of an attempt provision in § 2318 should not prevent the government from pursuing otherwise deserving cases. Thus, labels seized during the search of a counterfeiting operation may constitute part of the indicted conduct, whether or not the labels had yet been affixed to the works or transferred to distributors or customers. 3. Trafficking in Labels Affixed to, Enclosing, or Accompanying (or Designed to be Affixed to, Enclose, or Accompany) a Phonorecord, Computer Program, Motion Picture or Other Audiovisual Work, Literary, Pictorial, Graphic, or Sculptural Work, or Work of Visual Art, or Trafficking in Documentation or Packaging for Such Works In the third element of a § 2318 offense, the government must prove that the labels in which the defendant trafficked were affixed to, enclosing, or accompanying—or designed to be affixed to, enclose, or accompany— phonorecords, motion pictures or other audiovisual works, computer software, literary, pictorial, graphic, or sculptural works, or works of visual art. See 18 U.S.C. § 2318(a)(1)(A), (b)(3) (defining the classes of copyrighted works); 17 U.S.C. §§ 101, 102 (same). Alternatively, the government may show that the defendant trafficked in documentation or packaging for one of the enumerated class of works, or labels affixed or designed to be affixed to copyrighted documentation and packaging. See 18 U.S.C. § 2318(a)(1)(B), (b)(5). The types of copyrighted works covered by the statute has expanded significantly over the past two decades. Before 2004, 18 U.S.C. § 2318 applied only to labels for movies, music, and software, and to documentation and packaging only for computer software. The provisions relating to computer software were added in 1996. As of 2004, however, § 2318 applies to labels, documentation, and packaging for most types of copyrighted works that are capable of being labeled or packaged. See 18 U.S.C. § 2318(a)(1), (b)(5). Counterfeit labels (or documentation or packaging) need not actually be affixed or attached to a copyrighted work to support a § 2318 charge, but rather, need only be “affixed to, enclosing, or accompanying, or designed to be affixed to, enclose, or accompany.” 18 U.S.C. § 2318(a)(1) (emphasis added). Nevertheless, some nexus between the labels (or documentation or packaging) and copyrighted works—whether actual or intended—is still required. VI. Counterfeit and Illicit Labels 285 Documentation and packaging still need only be “for” the enumerated classes of copyrighted works. 18 U.S.C. § 2318(b)(5). Given the context, the word “for” appears to have roughly the same meaning for documentation and packaging that “affixed to, enclosing, or accompanying, or designed to be affixed to, enclose, or accompany” has for labels. Thus, some physical nexus with copyrighted works—whether actual or intended—is required for documentation and packaging as well. For a discussion of whether § 2318 applies to labels, documentation, and packaging in electronic form, see Section D.1. of this Chapter. 4. The Labels, Documentation, or Packaging Materials Are Counterfeit or Illicit In the fourth element, the government must prove that the packaging or documentation is “counterfeit” or that the labels are “counterfeit” or “illicit.” See 18 U.S.C. § 2318(a)(1)(A)-(B). “Counterfeit” is defined as something “that appears to be genuine, but is not.” 18 U.S.C. § 2318(b)(1), (b)(6). Courts have determined labels to be counterfeit for purposes of § 2318 where, for example, a defendant created the labels to accompany or apply to copies of Microsoft products and reprinted a Microsoft product key for a different copy on the label, Microsoft Corp. v. Pronet Cyber Techs., Inc., 593 F. Supp. 2d 876, 882 (E.D. Va. 2009); and where DVD labels “appeared to be ‘home made[,]’ were of poor quality, contained misspellings, and were not centered,” United States v. Teh, 535 F.3d 511, 520 (6th Cir. 2008). Counterfeit is distinct from “bootlegged” or “pirated” in that counterfeits are unauthorized copies of works that are made to appear legitimate, whereas bootlegged recordings or pirated items do not pretend to be legitimate. See United States v. Shultz, 482 F.2d 1179, 1180 (6th Cir. 1973) (“Counterfeit tapes are tapes which are represented to be genuine articles of particular record companies when, in truth, they are not. The process includes reproducing the tape itself and also the recognized label of another record company. A bootleg tape is a reproduction of someone else’s recording or recordings marketed under a different label.”). See also 18 U.S.C. § 2319A (addressing the unauthorized recording and trafficking of live musical performances, also known as “bootlegging”); Chapter II of this Manual. Counterfeit labels include those made when “counterfeiters have simulated ‘genuine’ labels that have not previously existed,” insofar as these simulated labels share the same basic criminal purpose as any counterfeit product— 286 Prosecuting Intellectual Property Crimes to defraud the consumer, the manufacturer, and society by trading off the product’s apparent authenticity. See S. Rep. No. 97-274, at 9 (1981), reprinted in 1982 U.S.C.C.A.N. 127, 135. “For example, cases have arisen where a counterfeiter has produced packages and distributed videotapes of a film which have never been released in that form to the public. The term ‘counterfeit label’ includes such simulated labels.” Id. Except for the Shultz case, supra, the extent to which such simulated labels are counterfeit for purposes of § 2318 has rarely been addressed in the courts. Prosecutors handling cases involving simulated labels may find it helpful to consult with the Computer Crime and Intellectual Property Section at (202) 514-1026. An “illicit” label, generally speaking, is a “genuine certificate, licensing document, registration card, or similar labeling component” intended for use with one of the enumerated classes of copyrighted works, that a defendant distributed or used without the work it was intended to accompany or falsely altered to indicate broader rights than originally intended. 18 U.S.C. § 2318(b) (4). Specifically, an “illicit” label is one that is: (A) used by the copyright owner to verify that [a copyrighted work of the type enumerated above] is not counterfeit or infringing of any copyright; and (B) that is, without the authorization of the copyright owner [either]— (i) distributed or intended for distribution not in connection with the copy, phonorecord, or work of visual art to which such labeling component was intended to be affixed by the respective copyright owner; or (ii) in connection with a genuine certificate or licensing document, knowingly falsified in order to designate a higher number of licensed users or copies than authorized by the copyright owner, unless that certificate or document is used by the copyright owner solely for the purpose of monitoring or tracking the copyright owner’s distribution channel and not for the purpose of verifying that a copy or phonorecord is noninfringing. 18 U.S.C. § 2318(b)(4). Under subsection (A), an illicit label may include any of a broad category of labeling components, such as most types of identifying labels, particularly those that include trademarks, seals, holograms, watermarks, or other marks intended to show that a product is genuine. Although it is not clear from the statute’s text and legislative history, presumably the definition does not include generic labels, such as packing slips, that merely identify a VI. Counterfeit and Illicit Labels 287 particular work, but which the copyright holder did not intend to certify the work’s authenticity. Subsection (B) identifies two situations in which a labeling component is “illicit.” First, a labeling component is illicit when it is distributed, without the copyright holder’s permission, apart from the original copyrighted item that the copyright owner intended the labeling component to accompany. For example, individual “licensing packs” for software that contain various labels, certificates of authenticity, and documentation and packaging would be deemed illicit if they were sold without the original media they were intended to accompany, or were sold with a pirated copy of the media. Second, a genuine labeling component is illicit when a genuine certificate of authenticity or similar licensing document has been knowingly falsified to indicate a higher number of authorized users or copies. For example, business software often comes in multi-user license packs that contain a single copy of the software itself on CD-ROM and a license that permits the software to be run for a certain number of users. If the licensing document for a ten-user license pack were knowingly falsified to indicate authorization for 100 users, the falsified licensing document would be illicit. 5. Federal Jurisdiction The final element of § 2318 requires the government to establish federal jurisdiction over the offense by proving any one of the following circumstances: • The offense occurred in a special maritime, territorial, or aircraft jurisdiction of the United States, § 2318(c)(1) • Use of or intent to use the mail or facilities of interstate or foreign commerce in the commission of the offense, § 2318(c)(2) • In the case of a counterfeit or illicit label, the label was affixed to, enclosed, or accompanied or designed to be affixed to, enclose, or accompany certain copyrighted works or a copy of these works: a phonorecord of a copyrighted sound recording or musical work; a computer program; a literary work; a pictorial, graphic or sculptural work; a work of visual art; or copyrighted documentation or packaging, § 2318(c)(3) • In the case of counterfeit documentation or packaging, the documentation or packaging itself was copyrighted, § 2318(c)(4) These jurisdictional elements are listed disjunctively, and therefore any one will suffice to support a § 2318 charge. For example, where a defendant trafficked in counterfeit labels for DVDs, the jurisdictional basis for a § 2318 288 Prosecuting Intellectual Property Crimes charge could be met by showing either that the labels were affixed (or designed to be affixed) to DVD copies of a copyrighted motion picture, or that the defendant used the mails or other facilities of interstate commerce to traffic in the labels, or that the defendant trafficked in the special maritime jurisdiction of the United States. In practice, the most likely basis for jurisdiction will be copyright. Even when the works are copyrighted, however, prosecutors may nevertheless find it easier to establish another basis for jurisdiction: a copyright may be more burdensome to prove or an alternative basis may be relatively clear. See Chapter II of this Manual, which discusses how to prove the existence of a copyright. The jurisdictional element in § 2318(c)(3) for counterfeit or illicit labels that accompany certain classes of works is worded unusually. It allows jurisdiction if the labels were affixed or designed to be affixed to copies of sound recordings, musical works, computer programs, motion pictures, audiovisual works, or documentation and packaging, if those items were “copyrighted.” It also allows jurisdiction if the labels were affixed or designed to be affixed to literary works, pictorial, graphic or sculptural works, or works or visual art, but does not indicate that these items must have been “copyrighted.” Compare § 2318(c)(3) (A)-(C), (G), with § 2318(c)(3)(D)-(F). However, these latter classes of works are subject to copyright protection, and § 2318 intends these terms to have the same meaning as in the copyright code. See 17 U.S.C. § 102; 18 U.S.C. § 2318(b)(3). Therefore, Congress’s omission of the word “copyrighted” from § 2318(c)(3)(D)-(F) was probably unintended, and therefore copyright should be read as necessary to establish jurisdiction under § 2318(c)(3), even for literary, pictorial, or visual art works. The government need not prove the defendant knew that his actions fell within the federal jurisdiction elements set forth in 18 U.S.C. § 2318(c). Thus, it is unnecessary to prove, for example, that the defendant knew that the copy of the computer program to which his counterfeit labels were affixed was copyrighted (see Section B.1. of this Chapter). Cf. United States v. Feola, 420 U.S. 671, 676 n.9 (1975) (“[T]he existence of the fact that confers federal jurisdiction need not be one in the mind of the actor at the time he perpetrates the act made criminal by the federal statute.”); United States v. X-Citement Video, Inc., 513 U.S. 64, 72 n.3 (1994) (affirming Feola as applied to strictly jurisdictional facts); United States v. Yermian, 468 U.S. 63, 68-70 (1984) (holding that the plain language of 18 U.S.C. § 1001, which is worded VI. Counterfeit and Illicit Labels 289 similarly to § 2318(a), indicates that Congress did not intend “knowingly and willfully” to apply to jurisdictional element). 6. Venue The proper venue for a § 2318 prosecution is addressed by general principles governing venue in criminal cases. Particular attention should be paid to offenses that involve the use of the mail or transportation in interstate or foreign commerce, which will occur in most § 2318 offenses. C. Defenses 1. Statute of Limitations Because § 2318 does not contain a specific statute of limitations, the general five-year statute of limitations for non-capital offenses applies. See 18 U.S.C. § 3282. 2. First Sale (Does Not Apply) Some defendants have sought to raise a “first sale” defense to a § 2318 charge, particularly a charge involving illicit labels, which, by definition, are genuine items that may have been obtained by the defendant legitimately. Although the “first sale” doctrine provides a valid defense to a charge of copyright infringement (see 17 U.S.C. § 109; Chapter II of this Manual, supra), permitting a person who has lawfully obtained title to a particular copy of a work to transfer or dispose of that particular copy without authorization from the copyright owner, Congress did not incorporate such a defense into § 2318. Indeed, for Congress to have done so would have eviscerated the purpose of § 2318’s illicit labels provision, which is designed to prohibit traffic in genuine labeling components that may be used to facilitate infringement. Courts have rejected attempts to raise a first sale defense in the context of § 2318. See United States v. Harrison, 534 F.3d 1371, 1373 (11th Cir. 2008). D. Special Issues 1. Electronic Copies of Labels, Documentation, or Packaging Although a typical case under § 2318 generally involves labels, docutmentation, or packaging in some sort of physical form, such as an adhesive decal, a cardboard box, or a manual printed on paper, § 2318 might also be 290 Prosecuting Intellectual Property Crimes applied in certain limited circumstances to cases when either the “original” or “legitimate” items, or the “counterfeit” or “illicit” copies, or both, are in electronic or digital form. Section 2318(b)(5) defines documentation and packaging as items which are “in physical form,” which would not prohibit trafficking in unauthorized copies of electronic documentation or manuals, when the original or legitimate versions are only available in electronic form, e.g., for download over the Internet. It is unclear whether the term “in physical form” would include a digitally-formatted manual tangibly embodied on a CD-ROM. Conduct involving unauthorized electronic copies of a physical version of a documentation or packaging (such as image files scanned from a paper manual or box), or of documentation that is legitimately distributed on a CD-ROM, nevertheless may implicate § 2318, either as evidence of a substantive violation of the trafficking provision, or as an act that aids or abets such trafficking or furthers a conspiracy to traffic. The House Report to the 2004 amendments also makes clear that § 2318’s criminal provisions do not apply to “electronic transmission” of “genuine” licensing components, documentation, or packaging. See H.R. Rep. No. 108600, at 4 (2004) (stating that the amendments “shall not be construed to apply ... in any case, to the electronic transmission of a genuine certificate, licensing document, registration card, similar labeling component, or documentation or packaging”). This language suggests that the unauthorized electronic distribution of labeling components that are purely electronic in their original or legitimate form, such as electronic signatures or watermarks, does not constitute criminal trafficking under § 2318 (although such conduct may violate other criminal statutes). However, the statute is silent as to whether § 2318 applies to the electronic transmission of labeling components that are not “genuine,” suggesting that it could be a criminal violation of § 2318 to traffic in electronic files that contain unauthorized copies of labeling components, where the original or legitimate labeling components were in physical form (e.g., trafficking in digital image files that contain a convincing reproduction of label decals or product packaging, such as would be suitable for printing additional counterfeit copies of the labels or packaging). Nevertheless, to date courts have not addressed the extent to which § 2318 may be applied in situations involving purely electronic labeling components. 2. Advantages of Charging a § 2318 Offense A § 2318 charge may be an appropriate adjunct or alternative charge when the offense involves copyright or trademark infringement. In many cases, the VI. Counterfeit and Illicit Labels 291 § 2318 charge may even be preferable. The mens rea (knowledge) and minimum threshold of illegal conduct (none) are both lower than the mens rea required in criminal copyright charges (willfulness) and the monetary and numerical thresholds for many criminal copyright charges. See Chapter II of this Manual. The standard of proof may also be lower than for criminal trademark charges, which require proof that any trademarks used on the counterfeit or illicit labeling are identical to or substantially indistinguishable from one registered with the U.S. Patent and Trademark Office. See Chapter III of this Manual. E. Penalties Section 2318(a) provides for a fine or imprisonment or both. Forfeiture and restitution are also available under § 2318(d). 1. Fines Under § 2318(a), a defendant may be “fined under this title [18],” which is an indirect reference to 18 U.S.C. § 3571 (“Sentence of fine”). Under 18 U.S.C. § 3571, an individual can be fined up to $250,000 and an organization can be fined up to $500,000, or either can be fined twice the offense’s pecuniary gain or loss, without limit. 18 U.S.C. § 3571(a)-(d). 2. Imprisonment The maximum term of imprisonment is five years. 18 U.S.C. § 2318(a). 3. Restitution Section 2318(d) specifies that restitution shall be subject to 18 U.S.C. § 2323, the general forfeiture and restitution provision for IP offenses created by the PRO-IP Act. According to Section 2323(c): “[w]hen a person is convicted of an offense under [§ 2318, inter alia], the court, pursuant to sections 3556, 3663A, and 3664 of this title, shall order the person to pay restitution to any victim of the offense as an offense against property referred to in section 3663A(c)(1)(A)(ii).” In turn, 18 U.S.C. § 3663A provides for mandatory restitution to victims of certain crimes, including crimes against property in Title 18, of which § 2318 is one. 18 U.S.C. § 3663A(c)(1)(A) (ii). Section 5E1.1 of the U.S. Sentencing Guidelines Manual also provides for restitution in cases where there is an identifiable victim and restitution is authorized under 18 U.S.C. § 3663A. Courts have affirmed restitution orders for convictions under § 2318. See United States v. Chay, 281 F.3d 682, 292 Prosecuting Intellectual Property Crimes 686 (7th Cir. 2002) (holding that an 18 U.S.C. § 2318(a) offense is “a crime against property covered by the Mandatory Victim Restitution Act (MVRA), 18 U.S.C. § 3663A” and affirming an order of $49,941.02 in restitution); United States v. Elouri, 62 Fed. Appx. 556 (5th Cir. 2003) (affirming an order on procedural grounds of $136,050 in restitution for a violation of § 2318). For more on restitution, see Chapter VIII of this Manual. 4. Forfeiture Seizure, forfeiture, and destruction of items in connection with a violation of § 2318 is governed by 18 U.S.C. § 2323. See 18 U.S.C. § 2318(d). Section 2323(b) requires a court, in imposing a sentence for violation of § 2318, to order the defendant to forfeit all counterfeit or illicit labels or other items the making or trafficking of which is prohibited under § 2318, as well as any property used or intended to be used in the offense, and any property constituting or derived from proceeds of the offense. Section 2323 also authorizes civil forfeiture of such items, apart from a criminal proceeding. For more on forfeiture, see Chapter VIII of this Manual. 5. Sentencing Guidelines Section 2B5.3 is the applicable sentencing guideline. See Chapter VIII of this Manual. Under § 2B5.3, often the most significant factor in the calculation of a sentence is the “infringement amount.” See § 2B5.3(b)(1). In copyright or trademark counterfeiting cases, the infringement amount is generally based on the number of infringing items multiplied by the retail price of either the genuine or infringing item. Because labels and packaging are generally not sold separately through legitimate retail channels, however, § 2318 offenses raise how such items should be valued for purposes of determining the infringement amount, particularly where the labels or packaging at issue have not been affixed to actual copies or goods. Application Note (2)(A)(vii) addresses valuation in cases under § 2318 involving such “unaffixed” counterfeit or illicit labels (or other items): (vii) A case under 18 U.S.C. § 2318 or § 2320 that involves a counterfeit label, patch, sticker, wrapper, badge, emblem, medallion, charm, box, container, can, case, hangtag, documentation, or packaging of any type or nature (I) that has not been affixed to, or does not enclose or accompany a good or service; and (II) which, had it been so used, would appear to VI. Counterfeit and Illicit Labels 293 a reasonably informed purchaser to be affixed to, enclosing or accompanying an identifiable, genuine good or service. In such a case, the “infringed item” is the identifiable, genuine good or service. § 2B5.3 n. 2(A)(vii). Thus, in a determining a Guideline sentence in a § 2318 case, if a counterfeit or illicit label has not been affixed to an actual copy of a copyrighted work, but the court finds that the label, if it had been used, would make it appear to a reasonably-informed purchaser that the item to which it was affixed was genuine, then the infringement amount should be determined based on the value of the item to which the item was designed to be affixed, rather than the (generally much lower) value of the label itself. Application Note 2(A)(vii) was added in 2006 in response to a provision of the Stop Counterfeiting in Manufactured Goods Act, which directed the Sentencing Commission to address how the infringement amount should be calculated for offenses involving labels, documentation, and packaging, that are not attached to or accompanying copyrighted works. See Pub. L. No. 109181, § 1, 120 Stat. 285 (2006). Prior to the 2006 Guidelines amendments, § 2B5.3 offered little guidance as to how unattached labels or packaging should be valued, leading courts to devise various theories for valuing such items for sentencing purposes. In United States v. Bao, 189 F.3d 860, 862-63 (9th Cir. 1999), the government seized 5,000 counterfeit manuals for software and counterfeit packaging materials such as CD-ROM inserts and product registration cards in Bao’s print shop. After Bao’s conviction under § 2318 for trafficking in counterfeit software manuals, the district court sentenced him based on a retail value of $50 per manual, the black market value of the software plus a manual. The court’s theory was that the manual had no value apart from the software. Id. at 862-63, 867. The Ninth Circuit vacated the sentence, holding that the manuals’ retail value should have been $12 apiece, the retail value of other comparable genuine manuals the victim sold separate from software. Id. at 866-67. In other words, the appropriate retail value was that of the counterfeit documentation, not the thing the documentation was to accompany. Cf. U.S. v. Guerra, 293 F.3d 1279, 1292 (11th Cir. 2002) (§ 2320 case holding that “[t]he value of the bands and labels is inextricably intertwined with that of the completed product, as the value of the counterfeit cigars derives primarily from the degree to which the bands and labels bear marks that are indistinguishable 294 Prosecuting Intellectual Property Crimes from the genuine marks. Thus, the district court did not err by considering ‘infringing items’ to be cigars rather than labels.”). Just as the retail value might depend on how many products the defendant had completed or could have completed readily, so might the number of infringing items. Two appellate courts have ruled that “the number of infringing items should correspond to the number of completed or nearly completed counterfeit goods.” U.S. v. Guerra, 293 F.3d 1279, 1293 (11th Cir. 2002) (citing United States v. Sung, 51 F.3d 92, 94-96 (7th Cir. 1995), appeal after remand, 87 F.3d 194 (7th Cir. 1996), on remand to, 940 F. Supp. 172 (N.D. Ill. 1996), rev’g trial court on other grounds, 114 F.3d 1192 (1997)). In both these cases, the number of infringing items was held to be not the number of infringing labels or packaging items, but rather the lower number of goods to which the labels or packaging had been or could readily have been attached. See id. However, both these cases concerned sentencing under a previous version of the counterfeit trademark criminal statute, 18 U.S.C. § 2320, which did not expressly apply to unattached labels or packaging, as both § 2318 and the current version of § 2320 now do. Under § 2318 (as well as § 2320), trafficking in counterfeit labels is not treated as an attempt to traffic in goods to which the labels might be affixed, but as a separate and complete offense, and therefore, a defendant’s sentence may properly be calculated based on the number of labels involved, rather than only on those labels that have already been affixed to an actual product. Further, Application Note 2(A)(vii) provides that in determining the infringement amount in § 2318 cases involving labels that, if used, would lead a reasonable purchaser to believe the items to which the labels were attached were genuine, the “infringed item” is the item to which the labels would be attached. Therefore, in such cases, the infringement amount should be based on the retail value of such item, multiplied by the number of labels. F. Other Charges to Consider When confronted with a case that implicates counterfeit or illicit labels or counterfeit documentation or packaging, prosecutors may want to consider the following crimes for charges in addition to 18 U.S.C. § 2318 or in lieu of such charges if § 2318’s elements cannot be met: • Copyright infringement, 17 U.S.C. § 506, 18 U.S.C. § 2319, for any infringement of the underlying copyrighted goods. See, e.g., United VI. Counterfeit and Illicit Labels 295 • • • • 296 States v. Cohen, 946 F.2d 430, 433-34 (6th Cir. 1991) (affirming conviction under 18 U.S.C. §§ 2318-2319 for duplicating and distributing copyrighted movies). A conspiracy or aiding-and-abetting theory will sometimes be necessary. See Chapter II of this Manual. Trademark counterfeiting, 18 U.S.C. § 2320, because labels, documentation, and packaging for copyrighted works often carry counterfeit reproductions of federally registered trademarks. See, e.g., United States v. Beltran, 503 F.3d 1, 2-4 (1st Cir. 2007) (upholding convictions under 18 U.S.C. §§ 2318-2320 for counterfeit DVDs and VHS tapes); United States v. Hernandez, 952 F.2d 1110, 1113-14 (9th Cir. 1991) (affirming conviction under 18 U.S.C. §§ 2318-2320 for counterfeit audio cassettes and audio cassette labels). See Chapter III of this Manual. Mail or wire fraud, 18 U.S.C. §§ 1341, 1343, for schemes that involve the use of the mails or wire, as long as there is a scheme to defraud. Cf. United States v. Shultz, 482 F.2d 1179, 1180 (6th Cir. 1973) (upholding convictions for mail fraud and counterfeit labels under an earlier version of § 2318, for causing the transportation of a counterfeit stereo tape cartridge recording in interstate commerce with forged or counterfeit label). The theory of fraud cannot be merely that the media was copyrighted, but rather that the defendant must have intended to defraud either his immediate purchaser or other downstream purchasers. See Chapter II, Section F. of this Manual. Racketeer Influenced and Corrupt Organizations (RICO), 18 U.S.C. §§ 1961-1968, because § 2318 violations serve as RICO predicate acts. See § 1961(1)(B). RICO charges must be approved by the Department’s Organized Crime and Gang Section, which can be reached at (202) 514-3594. Bootleg sound recordings and music videos of live musical performances, 18 U.S.C. § 2319A. See Chapter II, Section F. of this Manual. Prosecuting Intellectual Property Crimes VII. Patent A. Overview of Patent Unlike copyright and trademark infringement, there are no criminal penalties for committing patent infringement. Dowling v. United States, 473 U.S. 207, 227 (1985) (noting that “[d]espite its undoubted power to do so,” Congress has not provided criminal penalties for patent infringement). Congress instead has relied on provisions affording owners a civil cause of action for patent infringement. Id. at 227 n.19. As set forth more fully below, however, Congress has provided for two criminal provisions relating to patents: forgery of letters patent, and false marking of patents. As a threshold matter, it is worth revisiting the differences between patents and copyrights. Patent rights are available to anyone who invents “any new and useful process, machine, manufacture, or composition of matter, or any new and useful improvement thereof.” 35 U.S.C. § 101. A patent grants an inventor the right to exclude others from making, using, offering for sale, or selling devices that embody the patented invention. See 35 U.S.C. § 271(a); Eldred v. Ashcroft, 537 U.S. 190, 216 (2003) (citing Sears, Roebuck & Co. v. Stiffel Co., 376 U.S. 225, 229 (1964)). The federal government’s authority to grant patents stems from Article I, Section 8, Clause 8 of the U.S. Constitution, known as the “Intellectual Property” or “Copyright and Patent” Clause, which authorizes Congress to enact statutes that “promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” Congress first exercised this authority to grant patents in 1790, when Congress empowered the federal government to issue letters patent. Act of Apr. 10, 1790, ch. 7, § 1, 1 Stat. 109 (1790). Like their modern counterparts, “letters patent” contain a short title of the invention and a “grant” to the patent owner (“patentee”), and his or her heirs or assigns, of the right to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States. Cf. Eldred, 537 U.S. at 216; 35 U.S.C. § 154(a)(1). Currently, a patent grant lasts for a term beginning on the date the U.S. Patent and Trademark Office issues the patent and ending 297 20 years from the date on which the patentee filed his or her application for a patent grant. 35 U.S.C. § 154(a)(2). Although patents and copyrights share a common constitutional source (and the concomitant requirement that these exclusive rights are for “limited Times”), they differ in several meaningful respects. First, copyrights grant an author the right to exclude certain uses of the author’s expression of an idea contained in an “original work of authorship,” whereas patents grant an author the right to exclude others from making, using, and selling devices or processes that embody the claimed invention. See 17 U.S.C. § 102(a); 35 U.S.C. § 154(a)(1). Second, in exchange for granting the patentee this right to exclude, the patentee must publicly disclose the invention. Eldred, 537 U.S. at 216. “For the author seeking copyright protection, in contrast, disclosure is the desired objective, not something exacted from the author in exchange for the copyright.” Id. Third, a copyright gives the holder no monopoly on any knowledge or idea; a reader of an author’s writing may make full use of any fact or idea acquired by reading the writing. See 17 U.S.C. § 102(b); Eldred, 537 U.S. at 217. A patent, on the other hand, gives the patentee a monopoly on his invention to prevent the full use by others of the knowledge embodied in the patent. See Eldred, 537 U.S. at 217. It is also worth considering the difference between a patent and a trade secret. The first difference is naturally that trade secret information is protected only if it is secret (see Chapter IV, Section B.3.a.ii. of this Manual), whereas a patent is protected even after disclosure. During the patent process, a trade secret contained in a patent application may lose its trade secret protection through disclosure only to gain patent protection. (See Chapter IV, Section C.1.b.ii. of this Manual.) Second, a patent gives its owner an exclusive right to his invention, even against another who discovered the patented invention independently, whereas a trade secret, like a copyright, gives its owner no protection against independent discovery. ConFold Pac., Inc. v. Polaris Indus., 433 F.3d 952, 958-59 (7th Cir. 2006) (Posner, J.). B. Forgery of Letters Patent—18 U.S.C. § 497 Forging “letters patent” (described above) and knowingly passing off counterfeit letters patent are prohibited by 18 U.S.C. § 497: Whoever falsely makes, forges, counterfeits, or alters any letters patent granted or purporting to have been granted by 298 Prosecuting Intellectual Property Crimes the President of the United States; or Whoever passes, utters, or publishes, or attempts to pass, utter, or publish as genuine, any such letters patent, knowing the same to be forged, counterfeited or falsely altered—Shall be fined under this title or imprisoned not more than ten years, or both. As of this writing, no published opinions reported an applicable offense under this provision, although one court noted that Congress enacted the statute to “criminalize[] activities likely to impugn the reputation or integrity of the federal government regardless of whether the perpetrator intended to defraud private citizens.” United States v. Reich, 479 F.3d 179, 189 (2d Cir. 2007). The statute is one of many “designed to protect the integrity of government functions” but “do[es] not include the intent to defraud as an element of the crime of forgery.” United States v. Cowan, 116 F.3d 1360, 1363 (10th Cir. 1997). C. False Marking of Patent—35 U.S.C. § 292 To protect patent holders and the public, Congress enacted the false marking provision, 35 U.S.C. § 292, which provides for both criminal and civil actions against a defendant for false marking. Section 292(a) creates a financial punishment for three types of improper marking: (1) representing that an article is patented when the patent is in fact held by another; (2) marking as patented an article that is not patented; and (3) falsely claiming that a patent application has been made or is pending. In 2011, the statute’s scope was narrowed pursuant to the Leahy-Smith America Invents Act so that it is no longer a violation of the statute where “[t]he marking of a product ... with matter relating to a patent that covered that product but has expired.” 35 U.S.C. § 292(c). Section 16(b)(4) of the Act makes this and its other amendments to the false marking statute applicable “to all cases, without exception, that are pending on, or commenced on or after, the date of the enactment of this Act,” on September 16, 2011. Leahy-Smith America Invents Act, Pub. L. No. 11229, § 16(b)(4), 125 Stat. 284, 329 (2011). Congress prohibits false marking in part because a properly marked patented article provides the public with “a ready means of discerning the status of the intellectual property embodied in an article of manufacture or design.” Bonito Boats, Inc. v. Thunder Craft Boats, Inc., 489 U.S. 141, 162 (1989). This is consistent with federal patent policy, which recognizes an “important public VII. Patent 299 interest in permitting full and free competition in the use of ideas which are in reality a part of the public domain.” Lear, Inc. v. Adkins, 395 U.S. 653, 670 (1969). “Acts of false marking deter innovation and stifle competition in the marketplace.” Forest Group, Inc. v. Bon Tool Co., 590 F.3d 1295, 1302 (Fed. Cir. 2009). False marking harms that public interest because it “misleads the public into believing that a patentee controls the article in question (as well as like articles), externalizes the risk of error in the determination, placing it on the public rather than the manufacturer or seller of the article, and increases the cost to the public of ascertaining whether a patentee in fact controls the intellectual property embodied in an article.” Clontech Labs., Inc. v. Invitrogen Corp., 406 F.3d 1347, 1356-57 (Fed. Cir. 2005) (footnote omitted); see also Calderwood v. Mansfield, 71 F. Supp. 480, 482 (N.D. Cal. 1947) (noting that, under § 50, the former version of § 292, one purpose of the “false marking” statute was to “penalize those who would palm off upon the public unpatented articles, by falsely and fraudulently representing them to have been patented”). Section 292(a)’s first prohibition protects patent holders by prohibiting an individual, without a patent holder’s consent, from marking or using in advertising for a product: the words “patent,” “patentee,” or the like, with the intent of counterfeiting or imitating the mark of the patentee, or of deceiving the public and inducing them to believe that the thing was made, offered for sale, sold, or imported into the United States by or with the consent of the patentee. 35 U.S.C. § 292(a). Section 292(a)’s second and third paragraphs protect the public from false or misleading patent claims. The second paragraph prohibits individuals from marking or using in advertising the word “patent” in connection with any “unpatented article” for the purpose of deceiving the public. Clontech, 406 F.3d at 1352. For § 292 to apply, the mismarked article must “actually exist” and “be completed.” Lang v. Pac. Marine & Supply Co., 895 F.2d 761, 765 (Fed. Cir. 1990). Although not defined in the statute, an “unpatented article” is one that is not covered by any claim of any of the patents marked on the article. Or, as the Federal Circuit has held, an “unpatented article” means that “the article in question is not covered by at least one claim of each patent with which the article is marked. Thus, in order to determine if an article is ‘unpatented’ for 300 Prosecuting Intellectual Property Crimes purposes of section 292, it must be first determined whether the claims of a patent cover the article in question.” Clontech, 406 F.3d at 1352 (emphasis added). Although earlier courts consistently had found no violation of § 292 “by a patentee who marks patented articles with more patents than actually cover the item,” Genlyte Thomas Grp. LLC v. National Serv. Indus., Inc., 262 F. Supp. 2d 753, 756 (W.D. Ky. 2003) (internal citations and quotations omitted), the Federal Circuit’s decision in Clontech appears to have foreclosed this interpretation of an “unpatented article.” Brinkmeier v. Graco Children’s Products Inc., 684 F. Supp. 2d 548, 551 (D. Del. 2010) (“The court rejects Defendant’s contention that no actionable mismarking can occur if the product at issue is covered by at least one claim of the patents listed.”); DP Wagner Mfg. Inc. v. Pro Patch Sys., Inc., 434 F. Supp. 2d 445, 455 (S.D. Tex. 2006) (holding that the Federal Circuit’s construction of “unpatented article” is controlling, “notwithstanding the fact that other courts may have interpreted the term differently in the past”). Prior to the 2011 passage of the Leahy-Smith America Invents Act, the Federal Circuit had held that “an article covered by a now-expired patent is ‘unpatented.’” Pequignot v. Solo Cup Co., 608 F.3d 1356, 1361 (Fed. Cir. 2010); see also Bonito Boats, 489 U.S. at 159 (An article that “has been freely exposed to the public ... stands in the same stead as an item for which a patent has expired or been denied: it is unpatented and unpatentable”). “Thus, as with a neverpatented article, an article marked with an expired patent number imposes on the public ‘the cost of determining whether the involved patents are valid and enforceable.’” Pequignot, 608 F.3d at 1362 (quoting Clontech, 406 F.3d at 1357 n.6). However, as already noted, the Act amended the false marking statute so that this conduct no longer constitutes a violation of § 292(a). 35 U.S.C. § 292(c). Notably, “the omission of ‘applicable patents’ from a label listing patents purporting to cover the contents of a box of course cannot, in itself, be a violation of the false marking statute.” Arcadia Mach. & Tool, Inc. v. Sturm, Ruger & Co., 786 F.2d 1124, 1125 (Fed. Cir. 1986) (emphasis in original). In the same vein as § 292(a)’s second paragraph, the third paragraph prohibits individuals from marking or using in advertising the words “patent applied for” or “patent pending” for the purpose of deceiving the public when a patent application has neither been made nor is pending. 35 U.S.C. § 292(a). VII. Patent 301 Section 292(a) imposes a fine of not more than $500 for every offense. 35 U.S.C. § 292(a). Thus, “the statute’s plain language requires the penalty to be imposed on a per article basis,” not on a “per decision” nor a “timebased approach.” Forest Group, 590 F.3d at 1301-04 (reversing district court’s holding that penalty be imposed for each “decision” to mark multiple articles falsely). “Section 292 clearly requires a per article fine.” Id. at 1302. The “per article” unit of prosecution is consistent with the purpose behind the statute because “[t]he more articles that are falsely marked[,] the greater the chance that competitors will see the falsely marked article and be deterred from competing.” Id. at 1303. Significantly, the statute was amended in 1952 to remove any minimum fine. Id. at 1302. Thus, “district courts have the discretion to assess the per article fine at any amount up to $500 per article.” Id. Courts, for example, have the discretion to impose a penalty of a fraction of a penny per article. Id. at 1304. As a result, courts may use their “discretion to strike a balance between encouraging enforcement of an important public policy and imposing disproportionately large penalties for small, inexpensive items produced in large quantities.” Id. Because the fine for an infraction of 35 U.S.C. § 292 is a criminal fine, that fine is increased by 18 U.S.C. § 3571 to a maximum of $5,000 for individuals ($10,000 for corporations) or twice the monetary gain or loss. See 18 U.S.C. § 3571(b)(2), (b)(7), (c)(2), (c)(7), (d). Prior to the Leahy-Smith America Invents Act, § 292(b) provided for a civil qui tam remedy, which enabled any person to sue for the statutory penalty set forth in § 292(a) and retain one-half of the recovery, leaving the other half “to the use of the United States.” 35 U.S.C. § 292(b) (2010); Boyd v. Schildkraut Giftware Corp., 936 F.2d 76, 79 (2d Cir. 1991); Filmon Process Corp. v. SpellRight Corp., 404 F.2d 1351, 1355 (D.C. Cir. 1968) (holding that “§ 292(b), while penal, is not a criminal statute”). “The patentee is given this remedy to protect his patent position, and as a practical matter, the patentee is the only likely enforcer of it, as recovery requires proof that the statements were made without his consent.” Filmon, 404 F.2d at 1355. The Leahy-Smith America Invents Act made two substantive changes impacting the predecessor statute’s qui tam remedy. First, it eliminated the qui tam action. The Act added to section 292(a) that “[o]nly the United States may sue for the penalty authorized by this subsection,” and removed the qui tam action from section 292(b). America Invents Act § 16(b)(1) & (2). Second, the Act replaced the qui tam remedy with a civil compensatory damages action: “A 302 Prosecuting Intellectual Property Crimes person who has suffered a competitive injury as a result of a violation of this section may file a civil action in a district court of the United States for recovery of damages adequate to compensate for the injury.” 35 U.S.C. § 292(b). However, because criminal prosecutions pursuant to § 292 are rare, reported qui tam actions under the predecessor version of the false marking law are still helpful authority for interpreting the false marking statute in criminal cases. For example, at least one court rejected a private enforcement pursuant to § 292(b) because, inter alia, “the patent markings about which Plaintiffs complain were found on the packaging, and not on the product.” Rainworks Ltd. v. Mill-Rose Co., 609 F. Supp. 2d 732, 739 (N.D. Ohio 2009) (holding that “[b]ecause marking the outer packaging, when marking the product could be done, is insufficient for the notice requirements of 35 U.S.C. § 287(a), the actions of Defendants ... are equally insufficient for false marking liability under the penal statute, 35 U.S.C. § 292(a)”). In other words, if the marking is insufficient to meet patent law’s notice requirement, then the marking is also insufficient to support a claim under false marking statute. Consistent with the express language of the statute, courts have held that 35 U.S.C. § 292(a) requires the government to prove that the defendant intended to deceive or counterfeit. See Arcadia, 786 F.2d at 1125 (affirming holding that false marking statute was not violated where there was no evidence of intent to deceive). Thus, accidental or unintentional mismarking is not a violation. London v. Everett H. Dunbar Corp., 179 F. 506, 510 (1st Cir. 1910) (holding that interpreting patent claims is not an exact science, and hence where one “has an honest, though mistaken, belief that upon a proper construction of the patent it covers the article which he marks,” the requisite intent to deceive would not be shown); Brose v. Sears, Roebuck & Co., 455 F.2d 763, 768-69 (5th Cir. 1972) (same). “Intent to deceive is a state of mind arising when a party acts with sufficient knowledge that what it is saying is not so and consequently that the recipient of its saying will be misled into thinking that the statement is true.” Clontech, 406 F.3d at 1352 (citing Seven Cases v. United States, 239 U.S. 510, 517-18 (1916)). Using “objective standards,” the prosecution may establish a rebuttable presumption of the requisite intent to deceive where the government proves both (1) the fact of misrepresentation and that (2) the party making it had knowledge of its falsity. See id. (citing Norton v. Curtiss, 433 F.2d 779, 79596 (C.C.P.A. 1970)); Pequignot, 608 F.3d at 1362-63 (“the combination of a false statement and knowledge that the statement was false creates a rebuttable VII. Patent 303 presumption of intent to deceive the public, rather than irrebuttably proving such an intent”). A defendant’s “mere assertion” that he did not intend to deceive will not allow him to rebut the presumption. Pequignot, 608 F.3d at 1363; Clontech, 406 F.3d at 1352, 1353 n.2 (noting that “the inference of intent to deceive cannot be defeated with blind assertions of good faith where the patentee has knowledge of mismarking”). By the same token, “mere knowledge that a marking is false is insufficient to prove intent if [the defendant] can prove that it did not consciously desire the result that the public be deceived.” Pequignot, 608 F.3d at 1363. “Thus, a good faith belief that an action is appropriate ... can negate the inference of a purpose of deceiving the public.” Id. at 1364 (holding that advice of counsel and purpose other than deceiving the public sufficient to rebut presumption of intent to deceive). In addition, “[w]here the article marked is obviously very remote from the patent referred to in justification of the marking, this difference alone may be sufficient to show an intention to deceive; but where the difference is slight, and the question of the breadth of the invention or of the claims is so close as to permit of an honest difference of opinion,” then proof of such intent is more difficult. London, 179 F. at 510. Hence, to show knowledge of the misrepresentation, the government must show beyond a reasonable doubt that the articles in question were in fact mismarked, and that defendant did not have a reasonable belief that the articles were properly marked (i.e., covered by a patent or patent application). Cf. Clontech, 406 F.3d at 1352-53. D. No Prosecution for Interstate Transportation or Receipt of Stolen Property—18 U.S.C. §§ 2314, 2315 The interstate transportation of stolen property statute, 18 U.S.C. § 2314, does not allow prosecution of a person for the interstate distribution of patentinfringing goods when the only theory for the property’s being stolen is that it infringes a patent. See Dowling v. United States, 473 U.S. 207, 227 (1985) (dicta). The same dicta would likely apply to the interstate receipt of stolen property (18 U.S.C. § 2315). 304 Prosecuting Intellectual Property Crimes VIII. Penalties, Restitution, and Forfeiture A. Introduction This Chapter discusses the penalties for intellectual property crime, concentrating on the statutory sentencing factors, the United States Sentencing Guidelines (the “Guidelines”), restitution, and forfeiture. The Supreme Court’s seminal decision in United States v. Booker, 543 U.S. 220 (2005), changed the landscape of federal criminal sentencing. In Booker, the Supreme Court held that mandatory application of the Guidelines violated the Sixth Amendment right to trial by jury. Accordingly, the Supreme Court made the Guidelines advisory and excised the statutory provision which allowed departures only under certain very limited circumstances. See 18 U.S.C. § 3553(b)(1). The Guidelines still occupy a central role in sentencing, but are now just one of several statutory factors courts must consider. See 18 U.S.C. § 3553(a). Generally, sentencing courts will first consult the Guidelines, which will normally include calculating an advisory range of imprisonment. See Booker, 543 U.S. at 264; Gall v. United States, 552 U.S. 38, 46 (2007); Rita v. United States, 551 U.S. 338, 347-48 (2007); see also United States v. Crosby, 397 F.3d 103, 111 (2d Cir. 2005) (“[T]he excision of the mandatory aspect of the Guidelines does not mean that the Guidelines have been discarded. On the contrary, sentencing judges remain under a duty with respect to the Guidelines--not the previously imposed duty to apply the Guidelines, but the continuing duty to ‘consider’ them, along with the other factors listed in section 3553(a).”). The Guidelines are not entitled to greater weight than the other § 3553(a) factors. See Gall, 552 U.S. at 51 (deferential abuse-ofdiscretion standard applies to sentencing decisions both inside and outside of Guidelines range). After a Guideline determination is made, sentencing courts then consider all of § 3553(a) factors. See id. at 50. Appellate courts now review federal sentences for “reasonableness.” Booker, 543 U.S. at 260-61. This is both a procedural and a substantive inquiry. A 305 sentence may be unreasonable if the sentencing court commits procedural error by, among other things, failing to consider all of the factors in § 3553(a), or treating the Guidelines as mandatory. Gall at 51. Substantive reasonableness is based on the totality of the circumstances, including any variance from the Guidelines range. Id. But while a sentencing court may presume that a Guidelines sentence is reasonable, see Rita, 551 U.S. at 347, a non-Guidelines sentence based upon consideration of all of the § 3553 factors may also be reasonable. See Gall, 552 U.S. at 51 (reviewing courts “must give due deference to the district court’s decision that the § 3553(a) factors, on a whole, justify the extent of the variance”). B. The Statutory Sentencing Factors This subsection discusses how courts have used the following § 3553(a) sentencing factors in intellectual property cases: (a) Factors to be considered in imposing a sentence.--The court shall impose a sentence sufficient, but not greater than necessary, to comply with the purposes set forth in paragraph (2) of this subsection. The court, in determining the particular sentence to be imposed, shall consider-(1) the nature and circumstances of the offense and the history and characteristics of the defendant; (2) the need for the sentence imposed-(A) to reflect the seriousness of the offense, to promote respect for the law, and to provide just punishment for the offense; (B) to afford adequate deterrence to criminal conduct; (C) to protect the public from further crimes of the defendant; and (D) to provide the defendant with needed educational or vocational training, medical care, or other correctional treatment in the most effective manner; (3) the kinds of sentences available; 306 Prosecuting Intellectual Property Crimes (4) the kinds of sentence and the sentencing range established for-(A) the applicable category of offense committed by the applicable category of defendant as set forth in the guidelines-(i) issued by the Sentencing Commission pursuant to section 994(a)(1) of title 28, United States Code, subject to any amendments made to such guidelines by act of Congress (regardless of whether such amendments have yet to be incorporated by the Sentencing Commission into amendments issued under section 994(p) of title 28); and (ii) that, except as provided in section 3742(g), are in effect on the date the defendant is sentenced; or (B) in the case of a violation of probation or supervised release, the applicable guidelines or policy statements issued by the Sentencing Commission pursuant to section 994(a)(3) of title 28, United States Code, taking into account any amendments made to such guidelines or policy statements by act of Congress (regardless of whether such amendments have yet to be incorporated by the Sentencing Commission into amendments issued under section 994(p) of title 28); (5) any pertinent policy statement-(A) issued by the Sentencing Commission pursuant to section 994(a)(2) of title 28, United States Code, subject to any amendments made to such policy statement by act of Congress (regardless of whether such amendments have yet to be incorporated by the Sentencing Commission into amendments issued under section 994(p) of title 28); and VIII. Penalties, Restitution, and Forfeiture 307 (B) that, except as provided in section 3742(g), is in effect on the date the defendant is sentenced. (6) the need to avoid unwarranted sentence disparities among defendants with similar records who have been found guilty of similar conduct; and (7) the need to provide restitution to any victims of the offense. 18 U.S.C. § 3553(a). While courts need not engage in “robotic incantation” of the § 3553(a) factors, see Crosby, 397 F.3d at 113, Booker and its progeny have spurred sentencing courts to emphasize and articulate their reliance on these statutory factors, notwithstanding the applicable Guidelines range. This is clearly evident in intellectual property cases. Sentencing courts have used the § 3553(a) factors to justify sentences above the Guidelines range. See United States v. Williams, 526 F.3d 1312, 1322-23 (11th Cir. 2008) (in trade secret case, affirming sentence above the Guidelines range considering § 3553(a) factors, including: (i) that the defendant lied to the court about her criminal history; (ii) that the defendant was well-educated and did not require vocational education; (iii) the need to protect trade secrets; and (iv) the tremendous harm to the victim had the defendant succeeded); United States v. Bailey, 286 Fed. Appx. 678, 682 (11th Cir. 2008) (in copyright infringement case, sentencing court relied on § 3553(a) evaluation to sentence above the Guidelines range where defendant violated supervised release conditions, highlighting a need for deterrence in light of the defendant’s three consecutive release violations); United States v. Sow, 180 Fed. Appx. 278, 278-79 (2d Cir. 2006) (in affirming sentence, noting “the District Court found that ‘it is clearly Congress’ policy decision to treat seriously and punish with significant sentences these sorts of intellectual property and music pirating offenses,’ which relates directly to the ‘seriousness of the offense.’ See 18 U.S.C. § 3553(a)(2)(A).”). Courts also have used § 3553(a) analysis to support Guidelines sentences, including when defendants have complained that a correctly calculated Guidelines range is itself unfair. See United States v. Thomas, 331 Fed. Appx. 263, 265 (4th Cir. 2009) (in trademark counterfeiting case, affirming Guidelines sentence supported by § 3553(a) evaluation that considered defendant’s “lengthy involvement in counterfeit trafficking, his decision to involve his family members in the illegal activity and the scale of his operations,” and also distinguished defendant’s case from that of his co-conspirators who received 308 Prosecuting Intellectual Property Crimes lighter sentences); United States v. Four Pillars Enter. Co., 253 Fed. Appx. 502, 513 (6th Cir. 2007) (affirming Guidelines sentence meted out by district court considering § 3553(a) factors, including: (i) victim impact statements; (ii) the ongoing nature of the scheme; (iii) the defendants’ ability to pay a fine; and (iv) the defendants’ use of the trade secret owner’s own employee for economic espionage); United States v. Lozano, 490 F.3d 1317, 1324-25 (11th Cir. 2007) (in trademark counterfeiting case, affirming a Guidelines sentence supported by § 3553(a) factors and further finding that even if the Guidelines calculation were erroneous, the sentence would still have been reasonable based on the § 3553(a) factors, especially the seriousness of the offense—a five-year counterfeiting operation that resulted in at least ten seized shipments of counterfeit cell phone parts; continued even after the defendants knew they were under investigation; and was international, stretching from China to Central America); United States v. Sagendorf, 445 F.3d 515, 518 (1st Cir. 2006) (affirming a Guidelines sentence where the district court rejected defendant’s contention that the Guidelines range was unfairly high, citing as part of a § 3553(a) the seriousness of the offense and the need for general deterrence, even though specific deterrence might have required less). Finally, courts have used § 3553(a) factors to support sentences below the Guidelines range. See United States v. Jiang, No. 09-CR-34, 2009 WL 3254434, at *2 (E.D.N.Y. October 9, 2009) (in trademark counterfeiting case, imposing 30-month sentence, substantially below the 70-87 month Guidelines range, citing § 3553(a) factors, including defendant’s “strong work history and many friends and supporters in the community,” the adequacy of the sentence to achieve both “general” and “specific” deterrence, the defendant’s limited employment prospects and his remorse, even while acknowledging that such violations “destroy American commerce”); United States v. Kim, No. 07-0170-S-BLW, 2008 U.S. Dist. LEXIS 80043, at *6-7 (D. Idaho May 8, 2008) (in trademark counterfeiting case, imposing a 1-month sentence, below the 10-16 month Guidelines range, because of § 3553(a) factors, including the nature of offense—the sale of t-shirts in a remote location at prices far below those of genuine goods—and the history and characteristics of the defendant —55, married with five children, all U.S. citizens, with no criminal history and unlikely to reoffend, and facing deportation were a longer sentence imposed); United States v. Arman, No. 04-C-6617, 2006 U.S. Dist. LEXIS 4592, at *3-6 (N.D. Ill. February 2, 2006) (in trademark counterfeiting case, imposing sentence substantially below the Guidelines range based on consideration of § 3553(a) factors: (i) no health and safety concerns—defendant sold counterfeit VIII. Penalties, Restitution, and Forfeiture 309 cameras; (ii) trademark owner not harmed because counterfeits were obviously not genuine; and (iii) no apparent link to organized crime). The common theme from these cases is that sentencing courts now ignore or trivialize the § 3553(a) factors at their peril. See Gall, 552 U.S. at 50-51; United States v. Kononchuk, 485 F.3d 199, 204-06 (3rd Cir. 2007) (in trademark counterfeiting case, remanding for resentencing because district court merely gave “rote statement” of § 3553(a) factors in imposing probationary sentence substantially below the Guidelines range, while declining to address any of the government’s “cogent” objections, including (i) the disparity in treatment with co-conspirator who was far less culpable and also cooperated fully, but also received a sentence of probation, (ii) the sophistication of the defendant’s scheme, and (iii) the inappropriateness of the court’s offer to impose probation if the defendant, who had wealthy in-laws, would pay restitution on an accelerated schedule). C. Sentencing Guidelines This subsection addresses the interpretation and application of the United States Sentencing Guidelines (U.S.S.G.) in intellectual property prosecutions, primarily § 2B1.1 for Economic Espionage Act cases, § 2B5.3 for all other intellectual property offenses, and § 3B1.3 for crimes in which the defendant abused a position of trust or used a special skill. This subsection should be read in conjunction with the sections covering penalties in the chapters that present the substantive offenses, as well as with the chapter on victims’ rights. As with other crimes, prosecutors should generally continue to seek sentences within the Guidelines range in intellectual property prosecutions. The intellectual property Guidelines have been intricately fashioned through amendment and re-amendment, often incorporating and reacting to court decisions. For general guidance on this issue, prosecutors should consult Attorney General Eric Holder’s Memorandum on Department Policy on Charging and Sentencing (May 19, 2010), available at http://www.justice. gov/oip/holder-memo-charging-sentencing.pdf, which supersedes all prior memoranda, as well as USAM 9-27.710-760. For assistance with any sentencing issues specific to intellectual property crimes, please call CCIPS at (202) 514-1026 for assistance. 310 Prosecuting Intellectual Property Crimes 1. Offenses Involving Copyright (Including Bootleg Music, Camcorded Movies, and the Unauthorized Use of Satellite, Radio, and Cable Communications), Trademark, Counterfeit Labeling, and the DMCA a. Applicable Guideline is § 2B5.3 Sentencing calculations for the following offenses are governed by U.S.S.G. § 2B5.3: • Criminal copyright infringement, 17 U.S.C. § 506, 18 U.S.C. § 2319 • Criminal violations of the Digital Millennium Copyright Act (DMCA), 17 U.S.C. § 1204 • Trafficking in counterfeit labels, illicit labels, and counterfeit documentation or packaging, 18 U.S.C. § 2318 • Trafficking bootleg audio and video recordings of live musical performances, 18 U.S.C. § 2319A • Unauthorized recording of motion pictures in a movie theater, 18 U.S.C. § 2319B • Trafficking in counterfeit trademarked, service-marked, or certificationmarked goods, services, and labels, documentation, and packaging for goods and services, 18 U.S.C. § 2320 • Unauthorized reception of cable and satellite service, 47 U.S.C. §§ 553(b)(2), 605 and 18 U.S.C. § 2511 The Guidelines’ Statutory Index, U.S.S.G. App. A, refers these statutes to U.S.S.G. § 2B5.3. Section 2B5.3 has been amended a number of times over the last decade. For example, on May 1, 2000, it was amended to “ensure that the applicable guideline range for a defendant convicted of a crime against intellectual property” would be “sufficiently stringent to deter such a crime and to adequately reflect” consideration of “the retail value and quantity of the items with respect to which the crime against intellectual property was committed.” No Electronic Theft (NET) Act of 1997, Pub. L. No. 105-147, § 2(g), 111 Stat. 2678 (1997). Among other things, the May 2000 amendments increased the applicable base offense level from 6 to 8 and increased the number and type of special offense characteristics to include not only the infringement amount, but also characteristics for manufacturing, uploading, or importing infringing items; for infringement not committed for commercial advantage or private financial gain; and for risk of serious bodily injury or possession of a dangerous VIII. Penalties, Restitution, and Forfeiture 311 weapon in connection with the offense. See U.S.S.G. App. C (Amendments 590, 593). On October 24, 2005, § 2B5.3 was amended under emergency amendment authority, pursuant to the Family Entertainment and Copyright Act of 2005, which: (i) created a new intellectual property offense, “Unauthorized recording of Motion pictures in a Motion picture exhibition facility,” codified at 18 U.S.C. § 2319B; and (ii) directed the United States Sentencing Commission (the “Commission”) to “review and, if appropriate, amend the Federal sentencing guidelines and policy statements applicable to persons convicted of intellectual property rights crimes ....” Family Entertainment and Copyright Act of 2005, Pub. L. No. 109-9, §§ 102(a), 105(a), 119 Stat. 218, 218-220, 222-23 (2005). Among other things, the October 2005 amendment: (i) added a new specific offense characteristic (2) addressing infringement of pre-release works; (ii) renumbered offense characteristics (2)-(4) as offense characteristics (3)-(5); (iii) clarified the definition of uploading for technical purposes; (iv) clarified that the court can estimate the infringement amount using any relevant information; and (v) provided a reference in the Guidelines’ statutory index, Appendix A, assigning the new camcording offense, 18 U.S.C. § 2319B, to § 2B5.3. See U.S.S.G. App. C (Amendment 675). On November 1, 2006, the amendment was repromulgated as permanent, with slight changes to the definition of uploading contained in the original. See U.S.S.G. App. C (Amendment 687). On September 12, 2006, § 2B5.3 was amended again under emergency amendment authority, pursuant to the Stop Counterfeiting in Manufactured Goods Act, which directed the Commission to consider items, such as counterfeit labels and DMCA circumvention devices, that merely facilitate infringement. See Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1, 120 Stat. 285, 287-88 (Mar. 16, 2006). The September 2006 amendment provided that in cases under 18 U.S.C. § 2318 or § 2320 involving counterfeit labels, the infringement amount is based on the retail value of the infringed items to which the labels would have been affixed. See U.S.S.G. App. C (Amendment 682). On November 1, 2007, the amendment was repromulgated as permanent, adding a provision addressing downward departures for overstated infringement amounts, and several provisions concerning DMCA violations: (i) making § 2B5.3 the applicable guideline; (ii) clarifying that the infringement amount is the retail value of the work accessed; (iii) adding a 2-level enhancement under § 2B5.3; and (iv) making the application of the special skill adjustment under § 3B1.3 discretionary. 312 Prosecuting Intellectual Property Crimes See U.S.S.G. App. C (Amendment 704); see also Section E.5. of Chapter III (Trademark) of this Manual. On November 1, 2009, § 2B5.3 was amended again, this time responding to the Prioritizing Resources and Organization for Intellectual Property (PROIP) Act of 2008, which added statutory sentencing enhancements to 18 U.S.C. § 2320 providing that if an offender causes or attempts to cause serious bodily injury, the statutory maximum term of imprisonment is increased from 10 years to 20 years; if the offender causes or attempts to cause death, the statutory maximum is increased to any term of years (or to life). See PRO-IP Act, Pub. L. No. 110-403, § 205, 122 Stat. 4256, 4261-62 (2008). The November 2009 amendment: (i) clarified that the enhancement in § 2B5.3(b)(5), which applies when the offense involved the risk of serious bodily injury, also applies when the offense involved the risk of death; and (ii) increased the minimum offense level in such a situation from level 13 to level 14. See U.S.S.G. App. C (Amendment 735). This brought § 2B5.3 back into parallel with § 2B1.1, reflecting the Commission’s prior judgment that “aggravating conduct in connection with infringement cases should be treated under the guidelines in the same way it is treated in connection with fraud cases.” Id. (Amendment 590). As is discussed in Section C.2. of this Chapter, U.S.S.G. § 2B1.1 is the applicable Guideline for the Economic Espionage Act. b. Base Offense Level The base offense level under U.S.S.G. § 2B5.3 is 8. c. Adjust the Offense Level According to the “Infringement Amount”— U.S.S.G. § 2B5.3(b)(1) Under U.S.S.G. § 2B5.3(b)(1), the base offense level is adjusted according to the “infringement amount,” an estimate of the magnitude of infringement. “Similar to the sentences for theft and fraud offenses, the sentences for defendants convicted of intellectual property offenses should reflect the nature and magnitude of the pecuniary harm caused by their crimes. Accordingly, similar to the loss enhancement in the theft and fraud guideline, the infringement amount in subsection (b)(1) serves as a principal factor in determining the offense level for intellectual property offenses.” U.S.S.G. § 2B5.3 cmt. backg’d. The mechanics of calculating the infringement amount are covered in U.S.S.G. § 2B5.3 cmt. n.2. VIII. Penalties, Restitution, and Forfeiture 313 i. Formula The infringement amount is generally calculated by multiplying the number of infringing goods by the goods’ retail value. See U.S.S.G. § 2B5.3 cmt. n.2(A),(B). If the defendant infringed different types of items, the infringement amount is the sum of the individual infringement amounts for each type of item. Id. cmt. n.2(D). The infringement amount for each type of item is calculated independently of the others, including whether the retail value should be that of an infringing (counterfeit) item or an infringed (legitimate) item. Id. See Section C.1.c.iii. of this Chapter. The individual infringement amounts are then aggregated into a total infringement amount, which is plugged into the loss table in U.S.S.G. § 2B1.1. See Section C.1.c.v. of this Chapter. ii. Number of Infringing Items The number of infringing items may be easy to calculate. Victims or their representatives can often help verify the number when the number depends on whether an item’s copyright or trademark has been registered. For a list of industry associations that represent victims, consult Appendix G of this Manual or call CCIPS at (202) 514-1026. When the number of infringing items is difficult or impossible to calculate, however, reasonable estimates are allowed. See U.S.S.G. § 2B5.3, cmt. n.2(E). See also Section C.1.c.iv. of this Chapter. In cases under 18 U.S.C. § 2318 or § 2320, which involve counterfeit labels that have not been affixed to, or packaging that does not actually enclose or accompany, a good or service, count as the infringing items those labels and packaging which, “had [they] been so used, would appear to a reasonably informed purchaser to be affixed to, enclosing or accompanying an identifiable, genuine good or service.” U.S.S.G. § 2B5.3, cmt. n.2(A)(vii). In DMCA cases, count as the infringing items those “circumvention devices” which were used or designed to “access ... [a] copyrighted work.” Id. cmt. n.2(A)(viii). “‘Circumvention devices’ are devices used to perform the activity described in 17 U.S.C. 1201(a)(3)(A) and 1201(b)(2)(A).” Id. cmt. n.1. A recurring question is whether the infringement amount should include all the infringing items that the defendant acquired or only those that he provided to another, such as a customer or co-conspirator. For the offenses of trafficking in counterfeit goods and labels, the infringement amount should include all 314 Prosecuting Intellectual Property Crimes items the defendant acquired because the term “traffic” is defined to include obtaining control over an infringing item with the “intent to ... transport, transfer, or otherwise dispose of ” it. 18 U.S.C. §§ 2320(f )(5), 2318(b)(2). This applies equally if the defendant is convicted of attempting or conspiring to traffic in counterfeit goods. See 18 U.S.C. § 2320(a). Similarly, criminal copyright infringement includes the unauthorized “reproduction or distribution” of copyrighted works (emphasis added), and thus the infringement amount includes all infringing items, regardless of whether they were transferred to others. 17 U.S.C. § 506(a)(1)(B). The bootlegging and camcording statutes also criminalize the production of infringing items, regardless of distribution. See 18 U.S.C. §§ 2319A(a)(1), 2319B(a). Finally, the DMCA prohibits the production of infringing items—by circumventing protective technological measures—and does not require distribution. See 17 U.S.C. § 1201(a)(1)(A). Still open is the question of whether and to what extent to include items that are incomplete, such as items in the process of production. This issue is discussed at length in Section E.5. of Chapter III of this Manual (sentencing issues concerning counterfeit marks). iii. Retail Value The major issues with determining the retail value are what to do when the items have not been fully manufactured, how to value items that facilitate infringement, which market should be used for reference, and whether to use the value of a counterfeit or a legitimate item. These questions are addressed below. Incompletely Manufactured Items How to value items whose manufacture is incomplete is treated in Section E.5. of Chapter III and E.5. of Chapter VI of this Manual. Items that Facilitate Infringement Such as Labels and DMCA Circumvention Devices For cases under 18 U.S.C. § 2318 or § 2320 involving counterfeit labels or packaging, the infringement amount is based on the retail value of the infringed item, which is the “identifiable, genuine good or service” to which the label would have been affixed or the packaging would have enclosed or accompanied. U.S.S.G. § 2B5.3 cmt. n.2(A)(vii). For DMCA cases, the VIII. Penalties, Restitution, and Forfeiture 315 infringement amount is also based on the retail value of the infringed item, which is the “price the user would have paid to access lawfully the copyrighted work, and the ‘infringed item’ is the accessed work.” Id. cmt. n.2(A)(viii). Choosing the Correct Market “[T]he ‘retail value’ of an infringed item or an infringing item is the retail price of that item in the market in which it is sold.” U.S.S.G. § 2B5.3 cmt. n.2(C). To define the relevant market in which the items are sold, the government should focus on the market’s geographic location, whether it exists on the Internet or in real-world storefronts, and whether it is sold in a legitimate market or a black market. Infringing/Counterfeit vs. Infringed/Authentic Retail Values Infringing items often trade for much less than authentic items. Using the retail value of one rather than the other can easily mean the difference between months and years in prison, if not between prison and probation. Consequently, whether to use the retail value of counterfeit or authentic items is often the predominant issue at sentencing. The general rule of fitting the punishment to the harm applies to selecting the retail value. Intellectual property crimes create four basic types of harm: (1) the fraud on consumers who were tricked into buying something inauthentic (at the defendant’s prices); (2) the legitimate income that rights holders lost (at legitimate prices) when consumers mistakenly bought the defendant’s items; (3) the rights holders’ inability to control the use of their property, whether consumers were defrauded or not; and (4) the defendant’s unjust enrichment (at the defendant’s prices) by using the rights-holder’s intellectual property unlawfully. To value these harms, the law simplified the inquiry into whether the defendant caused or was likely to have caused the victim to lose sales. If so, the maximum measure of harm is the victim’s lost sales, which are valued at the victim’s own prices. If not, the maximum measure of harm is the defendant’s gain, which is valued at what the defendant took in, at his own prices. And if the counterfeit price is hard to determine, then the harm should be computed at the legitimate item’s price for ease of calculation. Originally, the Guidelines directed courts to account for these harms by using only the retail value of infringing (counterfeit) items. See U.S.S.G. § 2B5.3(b) (1) & cmt. n.1 & backg’d (1998). But this approach was difficult to apply when 316 Prosecuting Intellectual Property Crimes infringing content, such as pirated software or music, had been distributed for free over the Internet, thereby resulting in an infringement amount of $0. Nor did the Guidelines explain how to calculate the retail value of the infringing items when that value was difficult to determine. Notwithstanding the original Guidelines’ silence as to a legitimate item’s retail value, courts recognized its relevance in a variety of circumstances. The Second Circuit clarified that highquality fakes should be valued at the retail price and lower-quality fakes should be valued at the counterfeit price. See United States v. Larracuente, 952 F.2d 672, 674-75 (2d Cir. 1992). Other courts recognized that a genuine item’s price could help determine a counterfeit item’s retail value when it otherwise was difficult to determine. See, e.g., United States v. Bao, 189 F.3d 860, 866-67 (9th Cir. 1999). On May 1, 2000, the Guidelines caught up to the case law by concentrating on the harm the defendant caused, whether he displaced the victim’s legitimate sales, and how hard it is to calculate the counterfeit’s value. See U.S.S.G. App. C (Amendments 590, 593). Application Note 2(A) to U.S.S.G. § 2B5.3 now instructs the court to use the retail value of an authentic item if any one of the following situations applies: The infringing item “is, or appears to a reasonably informed purchaser to be, identical or substantially equivalent to the infringed item,” U.S.S.G. § 2B5.3 cmt. (n.2(A)(i)(I)) Differences in appearance and quality therefore matter if they could be ascertained by “a reasonably informed purchaser.” Id. An infringing item that could fool only an uninformed purchaser would be valued at the counterfeit retail value. See United States v. Park, 373 Fed. Appx. 463, 464 (5th Cir 2010) (district court did not clearly err in using retail value of infringed items to calculate Guidelines range after receiving expert testimony that infringing items “would have appeared to a reasonably informed purchaser to be identical or substantially equivalent to the infringed items”); United States v. Alim, 256 Fed. Appx. 236, 240-41 (11th Cir. 2007) (same); United States v. Lozano, 490 F.3d 1317, 1322-23 (11th Cir. 2007) (same); United States v. Yi, 460 F.3d 623, 636-638 (5th Cir. 2006) (district court erred in using retail value of infringed items in part because the infringed and infringing items did not appear “virtually indistinguishable to a reasonably informed purchaser”). VIII. Penalties, Restitution, and Forfeiture 317 The infringing item is a digital or electronic reproduction, U.S.S.G. § 2B5.3 cmt. n.2(A)(i)(II) For digital or electronic reproductions, use the retail value of the authentic item regardless of whether the reproductions appear authentic to a reasonably informed purchaser. A counterfeit movie DVD with an obviously counterfeit label is valued at the authentic item’s retail value, even though nobody would be confused into mistaking the counterfeit for an authentic DVD. Because a digital or electronic reproduction is a perfect substitute for the real thing, whether its outer trappings look legitimate or not, the Commission reasoned that in such cases, “the sale of an infringing item results in a displaced sale of the legitimate, infringed item,” making it appropriate to use the value of the infringed items for Guidelines calculations. U.S.S.G. App. C (Amendment 593). Moreover, the guideline simply does not distinguish between types of digital reproduction, such as when the digital or electronic reproduction is not a perfect substitute because its quality was degraded, as with a camcorded movie or a musical song that has been reproduced at a lower sampling rate than CD quality. The counterfeit was sold at 75% or more of the authentic item’s retail price, U.S.S.G. § 2B5.3 cmt. n.2(A)(ii) The Commission reasoned that counterfeits sold at steep discounts should not be valued the infringed items’ price because “the greatly discounted price at which [the counterfeits are] sold suggests that many purchasers of infringing items would not, or could not, have purchased the infringed item in the absence of the availability of the infringing item.” U.S.S.G. App. C (Amendment 593). Therefore, counterfeits sold at “not less than 75% of the retail price of the infringed item” may be valued at the infringed items’ price. Id.; see also Yi, 460 F.3d at 637-38 (district court erred in using value of infringed items in part because the infringing items sold for well below 75% of the infringed items’ retail price). The counterfeit’s retail value “is difficult or impossible to determine without unduly complicating or prolonging the sentencing proceeding,” U.S.S.G. § 2B5.3 cmt. n.2(A)(iii) Another enumerated situation permitting use of the infringed items’ retail value is when the counterfeit’s retail is “difficult or impossible to determine without unduly complicating or prolonging the sentencing proceeding.” U.S.S.G. § 2B5.3 cmt. n.2(A)(iii); see also Yi, 460 F.3d at 638 (district court 318 Prosecuting Intellectual Property Crimes erred in using value of infringed items in part because “the retail values of many of the infringing items were not only known to the government but presented at trial”). Moreover, as is discussed in Section C.1.c.iv. of this Chapter, reasonable estimates of the counterfeit retail prices are acceptable, but speculative guesses or overly time-consuming calculations are not. The offense involved illegal interception of satellite cable signals in violation of 18 U.S.C. § 2511, where “the ‘retail value of the infringed item’ is the price the user of the transmission would have paid to lawfully receive that transmission, and the ‘infringed item’ is the satellite transmission rather than the intercepting device,” U.S.S.G. § 2B5.3 cmt. n.2(A)(iv) See United States v. Brereton, 196 Fed. Appx. 688, 691-93 (10th Cir. 2006) (district court did not clearly err in relying on expert testimony that purchasers of pirated DIRECTV access cards had “viewing habits like those in the top ten percent of all DIRECTV customers” and then using the cost for that level of access as the “retail value of the infringed item”). The Commission did not specify why it cited only 18 U.S.C. § 2511 and not other statutes criminalizing the illegal interception of satellite cable signals, such as 47 U.S.C. §§ 553(b) (2) and 605, but neither did it exclude them from the rule’s application. See U.S.S.G. App. C (Amendment 593). The retail value of the authentic good is a better approximation of the harm than the value of the counterfeit, U.S.S.G. § 2B5.3 cmt. n.2(A)(v) See Lozano, 490 F.3d at 1322-23 (district court did not clearly err in using retail value of infringed item after finding this provided a more accurate assessment of the pecuniary harm to the rights holder than the value of the infringing items); Yi, 460 F.3d at 637 (error to use infringed items’ retail value because it was “not at all clear on which record evidence, if any, the district court based its assessment that the infringed item value provides a more accurate assessment of the pecuniary harm to the trademark owners”). The offense involves the display, performance, publication, reproduction, or distribution of a work being prepared for commercial distribution. In a case involving such an offense, the ‘retail value VIII. Penalties, Restitution, and Forfeiture 319 of the infringed [authentic] item’ is the value of that item upon its initial commercial distribution, U.S.S.G. § 2B5.3 cmt. n.2(A)(vi) This is part of the Sentencing Commission’s solution to the so-called “pre-release problem”—that is, how to value an infringing copyrighted work whose infringement occurred before the rights-holder put the authentic work on the market itself. Confronted with widely diverging estimates of the harm caused by pre-release piracy, the Commission determined that a pre-release work’s retail value should equal its anticipated legitimate retail value, but that a 2-point upward adjustment should be added for all pre-release offenses. See U.S.S.G. § 2B5.3(b)(2). See also Section C.1.d. of this Chapter. A case under 18 U.S.C. § 2318 or § 2320 that involves a counterfeit label, patch, sticker, wrapper, badge, emblem, medallion, charm, box, container, can, case, hangtag, documentation, or packaging of any type or nature (I) that has not been affixed to, or does not enclose or accompany a good or service; and (II) which, had it been so used, would appear to a reasonably informed purchaser to be affixed to, enclosing or accompanying an identifiable, genuine good or service. In such a case, the “infringed item” is the identifiable, genuine good or service, U.S.S.G. § 2B5.3 cmt. n.2(A)(vii) The Sentencing Commission was responding to the directive in the Stop Counterfeiting in Manufactured Goods Act that it address situations in which “the item in which the defendant trafficked was infringing and also was intended to facilitate infringement in another good or service, such as a counterfeit label, documentation, or packaging ....” See U.S.S.G. Appendix C (Amendment 682); cf. United States v. Sung, 87 F.3d 194, 196 (7th Cir. 1996) (prior to Amendment 682, holding that defendant could only be held liable for the counterfeit shampoo bottles he actually filled, unless the district court found with “reasonable certainty” that he had intended to fill the rest). A case under 17 U.S.C. §§ 1201 and 1204 in which the defendant used a circumvention device. In such an offense, the ‘retail value of the infringed item’ is the price the user would have paid to access lawfully the copyrighted work, and the ‘infringed item’ is the accessed work, U.S.S.G. § 2B5.3 cmt. n.2(A)(viii) This was the Sentencing Commission’s response to the directive in the Stop Counterfeiting in Manufactured Goods Act that it address situations in which “the item in which the defendant trafficked was not an infringing item but 320 Prosecuting Intellectual Property Crimes rather was intended to facilitate infringement, such as an anti-circumvention device (sic) ....” See U.S.S.G. App. C (Amendment 704). This applies only if the “defendant used a circumvention device and thus obtained unauthorized access to a copyrighted work.” Id. If the defendant “violated 17 U.S.C. §§ 1201 and 1204 by conduct that did not include use of a circumvention device ... the infringement amount would be determined by reference to the value of the infringing item, which in these cases would be the circumvention device.” Id. If any one of the above situations applies, the retail value is that of the infringed (legitimate) item. If none of these situations apply, the retail value is that of the infringing (counterfeit) item. See U.S.S.G. § 2B5.3 cmt. n.2(B) & backg’d; id. App. C (Amendment 593). This includes cases involving the unlawful recording of a musical performance in violation of 18 U.S.C. § 2319A. U.S.S.G. § 2B5.3 cmt. n.2(B). iv. Determining Amounts and Values— Reasonable Estimates Allowed Any relevant source of information is appropriate in determining the infringing or infringed item’s retail value. Actual prices are preferable, such as prices determined from the defendant’s price list, prices charged during undercover buys, or actual retail prices for specific items in the legitimate manufacturer’s catalogue. Approximations may be necessary, however, and they may include estimations of the average counterfeit prices in the market or region as determined by experts, or the average retail price for a product line in the manufacturer’s catalogue. The same rule applies when determining the number of infringing items: actual counts are preferable, but approximations are appropriate. U.S.S.G. § 2B5.3 explicitly states that reasonable estimates are acceptable. On October 24, 2005, on a temporary, emergency basis, and on November 1, 2006, permanently, Application Note 2(E) was added to U.S.S.G. § 2B5.3: (E) Indeterminate Number of Infringing Items.—In a case in which the court cannot determine the number of infringing items, the court need only make a reasonable estimate of the infringement amount using any relevant information, including financial records. VIII. Penalties, Restitution, and Forfeiture 321 See U.S.S.G. App. C (Amendment 675, 687). The reference to financial records is likely an incorporation of the Tenth Circuit’s holding in Foote. See United States v. Foote, 413 F.3d 1240, 1251 (10th Cir. 2005) (allowing analysis of defendant’s bank records to aid in determining infringement amount); see also United States v. Sweeney, 611 F.3d 459, 474 (8th Cir. 2010) (holding that district did not clearly err under § 2B5.3 in making a “reasonable estimate” of the infringement amount by starting with the gross revenues of the defendants’ company, which sold cable television descramblers); United States v. Beydoun, 469 F.3d 102, 105-06 (5th Cir. 2006) (noting under § 2B5.3 only a reasonable estimate of copyright infringement was required). Although statistical precision is preferable, it is not necessary. For example, in Sweeney, the defendants argued that the government had not proved that any of the 178,260 descramblers it sold over a three-year period were “actually used to intercept cable signals illegally,” and the “correct infringement amount was therefore $0.” Sweeney, 611 F.3d at 474. Rejecting this as “sophistry,” the Court found that, under the methodology set out in U.S.S.G. § 2B5.3, cmt. n.2(E), “[i]t [was] perfectly reasonable to infer that the majority of these descramblers were in fact used to steal cable programming,” even though “the exact number and value of stolen cable transmissions [were] unknown ....” Id. Although U.S.S.G. § 2B5.3 speaks only of estimating the number of infringing items, there is no reason to believe that it abrogates earlier law allowing the estimation of retail values. E.g., United States v. Brereton, 196 Fed. Appx. 688, 692-93 (10th Cir. 2006) (citing Foote, finding that district court did not clearly err in making reasonable estimate of retail value of pirated DIRECTV access cards); Foote, 413 F.3d at 1251 (“[d]istrict courts have considerable leeway in assessing the retail value of the infringing items, and need only make a reasonable estimate of the loss, given the available information”) (internal quotation marks and citation omitted); United States v. Slater, 348 F.3d 666, 670 (7th Cir. 2003) (confirming that district courts have “considerable leeway in assessing the retail value of the infringing items” and that courts “need only make a reasonable estimate of the loss, given the available information,” citing the former U.S.S.G. § 2F1.1, now replaced by § 2B1.1). v. Cross-Reference to Loss Table in U.S.S.G. § 2B1.1 Once calculated, the infringement amount sets the scope of the enhancement in U.S.S.G. § 2B5.3(b)(1): 322 Prosecuting Intellectual Property Crimes • An infringement amount below or up to $2,000 results in no increase; • An infringement amount above $2,000 and up to $5,000 results in a 1-level increase; and • An infringement amount above $5,000 increases the offense level according to the loss table in U.S.S.G. § 2B1.1(b)(1) (Theft, Embezzlement, Receipt of Stolen Property, Property Destruction, and Offenses Involving Fraud or Deceit). When consulting U.S.S.G. § 2B1.1, look only to the loss table in subsection (b)(1); other portions of that guideline—including the base offense level, other offense enhancements, and the commentary—are inapplicable. See U.S.S.G. § 1B1.5(b)(2). Moreover, U.S.S.G. § 2B5.3(b)(1)’s citation to the loss table in U.S.S.G. § 2B1.1 does not mean that the infringement amount should equal the victim’s loss. Rather, the infringement amount approximates the victim’s loss, but need not equal it. See United States v. Bao, 189 F.3d 860, 867 (9th Cir. 1999) (finding that district court properly calculated the amount for the loss table in U.S.S.G. § 2F1.1 – which has since been replaced by U.S.S.G. § 2B1.1 – by using the retail value of the counterfeit items and not the loss derived from their production); United States v. Cho, 136 F.3d 982 (5th Cir. 1998) (same); U.S.S.G. Appendix C (Amendments 590, 593) (discussing infringement amount as similar to loss and an approximation of harm); cf. United States v. Koczuk, 252 F.3d 91, 97 (2d Cir. 2001) (in wildlife case, citing Cho, finding that calculation using loss table in U.S.S.G. § 2F1.1 should be based on retail price of endangered species involved, not economic loss caused by offense). On this technical point, United States v. Sung, 51 F.3d 92, 95 (7th Cir. 1995) is incorrect when it confuses the infringement amount with the loss incurred. Although the infringement amount is often characterized as describing the “loss” to the victim, it is not necessary for the government to show that the copyright owner suffered any actual pecuniary loss. See Beydoun, 469 F.3d at 105 (defendant, who produced booklets of counterfeit cigarette rolling papers with the intent to sell them, was accountable even if he “never sold a single infringing booklet”); United States v. Powell, 139 Fed. Appx. 545 (4th Cir. 2005) (applying 2003 Guidelines, finding enhancement under § 2B1.1 table based on infringement amount of more than $250,000 was proper even though the victim suffered no pecuniary loss; sentence vacated and remanded on other grounds). VIII. Penalties, Restitution, and Forfeiture 323 d. Pre-release Piracy Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(2) Distribution of a copyrighted item before it is legally available to the consumer is more serious than the distribution of already available items. U.S.S.G. App. C (Amendment 675, 687). Consequently, effective October 24, 2005, on a temporary, emergency basis, and permanently on November 1, 2006, the Sentencing Commission added a 2-level enhancement for offenses that involve the display, performance, publication, reproduction, or distribution of a work being prepared for commercial distribution. See U.S.S.G. § 2B5.3(b) (2). A “[w]ork being prepared for commercial distribution” has the meaning given in 17 U.S.C.§ 506(a)(3). U.S.S.G. § 2B5.3 cmt. n.1. See also Chapter II of this Manual. The 2-level increase for pre-release piracy applies not only to the online pre-release offense set forth in 17 U.S.C. § 506(a)(1)(C) (which by definition involves pre-release piracy over publicly-accessible computer networks), but also to any copyright crimes under § 506(a)(1)(A) or (B) that involve prerelease piracy done through any other medium, such as a § 506(a)(1)(A) conviction for selling pirated pre-release movie DVDs. e. Manufacturing, Importing, or Uploading Infringing Items Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(3) [before October 24, 2005: § 2B5.3(b)(2)] The offense level is increased by 2 levels if the offense involves the “manufacture, importation, or uploading of infringing items.” U.S.S.G. § 2B5.3(b)(3). If, after applying § 2B5.3(a), (b)(1), (b)(2), and the 2-level increase in (b)(3), the offense level is less than 12, then it must be increased to 12. U.S.S.G. § 2B5.3(b)(3). This upward adjustment reflects the need to punish those who introduce infringing goods into the stream of commerce. U.S.S.G. App. C (Amendments 590, 593). Uploading is particularly troublesome because it not only introduces infringing items into the stream of commerce, but also enables further infringement of the works. U.S.S.G. App. C (Amendments 590, 593). “‘Uploading’ means making an infringing item available on the Internet or a similar electronic bulletin board with the intent to enable other persons to (A) download or otherwise copy the infringing item; or (B) have access to 324 Prosecuting Intellectual Property Crimes the infringing item, including by storing the infringing item as an openly shared file. ‘Uploading’ does not include merely downloading or installing an infringing item on a hard drive on a defendant’s personal computer unless the infringing item is an openly shared file.” U.S.S.G. § 2B5.3 cmt. n.1 (Nov. 1, 2006). (Before the October 24, 2005 temporary, emergency amendments, made permanent on November 1, 2006 with minor changes, “uploading” was defined in § 2B5.3’s first and third application notes. The 2005 and 2006 amendments consolidated the definition into the first application note and clarified the circumstances in which loading a file onto a computer hard drive constitutes uploading. See U.S.S.G. App. C (Amendments 675, 687).) Manufacturing and importing infringing items are also singled out for a 2-level increase because those actions introduce infringing items into the stream of commerce. U.S.S.G. § 2B5.3 and App. C (Amendments 590, 593). Although the Guidelines do not define “manufacturing,” the important distinction is between manufacturing (which gets the 2-level increase) and mere distribution and trafficking (which do not get an increase unless the conduct also involved importation or uploading). See United States v. Gray, 446 Fed. Appx. 569, 570 (4th Cir. 2011) (per curiam) (district court did not clearly err in applying manufacturing enhancement to defendant who “not only bought and resold infringing materials, but ... personally created infringing materials using equipment found in his home”); Brereton, 196 Fed. Appx. at 693 (finding that defendant’s reprogramming of pirated DIRECTV access cards before selling them justified manufacturing enhancement). Manufacturing should encompass not only the production of counterfeit trademarked hard goods, but also the performance of counterfeit servicemarked services and the production and reproduction of pirated copyrighted works under 17 U.S.C. § 506; counterfeit labels under 18 U.S.C. § 2318; bootleg music recordings under 17 U.S.C. § 2319A; camcorded movies under 18 U.S.C. § 2319B; and illegal circumvention devices under 17 U.S.C. § 1204. If a defendant conspired with or aided and abetted another person who manufactured, uploaded, or imported infringing items, the defendant can qualify for this 2-level increase even if he did none of these things himself. The increase is triggered by whether the offense involved manufacturing, importation, or uploading, not whether the defendant performed these tasks. See U.S.S.G. § 2B5.3(b)(3) (“If the offense involved the manufacture, VIII. Penalties, Restitution, and Forfeiture 325 importation, or uploading ...”) (emphasis added); U.S.S.G. § Ch. 2 (Introductory Commentary) (“Chapter Two pertains to offense conduct.”). f. Offense Not Committed for Commercial Advantage or Private Financial Gain Reduces the Offense Level by 2—U.S.S.G. § 2B5.3(b)(4) The fourth offense characteristic, located in guideline § 2B5.3(b)(4), decreases the offense level by 2 levels if the offense was not committed for commercial advantage or private financial gain, but the resulting offense level cannot be less than 8. The defendant bears the burden of proving that he is entitled to this offense characteristic, because it is structured as a decrease rather than an increase. See generally United States v. Perez, 418 Fed. Appx. 829, 836 (11th Cir. 2011) United States v. Ameline, 409 F.3d 1073, 1086 (9th Cir. 2005) (en banc); United States v. Dinges, 917 F.2d 1133, 1135 (8th Cir. 1990); United States v. Kirk, 894 F.2d 1162, 1164 (10th Cir. 1990); United States v. Urrego-Linares, 879 F.2d 1234, 1238-39 (4th Cir. 1989); United States v. Herbst, No. 10-CR1008-LRR, 2011 WL 794507, at *12 (D. Iowa March 1, 2011). For a detailed discussion of what qualifies as conduct done for the purposes of commercial advantage or private financial gain, see Section B.4. of Chapter II (Copyright) of this Manual. The interpretation of commercial advantage and private financial gain in copyright cases applies equally to U.S.S.G. § 2B5.3 for any type of intellectual property crime because the statutory and Guidelines definitions are nearly identical. Compare U.S.S.G. § 2B5.3 cmt. n.1 (defining terms) with 17 U.S.C. § 101 (same). g. Offense Involving a Counterfeit Drug Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(5) (effective November 1, 2013) In an amendment scheduled to take effect November 1, 2013, if the offense involved a counterfeit drug, the offense level is increased by 2. See U.S.S.G. § 2B5.3(b)(5). This will replace the existing § 2B5.3(b)(5), which will be renumbered § 2B5.3(b)(6). In March 2011, the Office of the Intellectual Property Enforcement Coordinator transmitted a range of legislative proposals to Congress including a number or recommendations to enhance certain Guidelines, including those for counterfeit drugs. See Administration’s White Paper on Intellectual Property Enforcement Legislative Recommendations (March 2011) (“White Paper”), 326 Prosecuting Intellectual Property Crimes available at http://www.whitehouse.gov/sites/default/files/ip_white_paper.pdf. In response, the Food and Drug Administration Safety and Innovation Act, Pub. L. No. 112-144, § 717(b), 126 Stat. 993, 1076 (July 9, 2012), directed the United States Sentencing Commission to review existing penalties for violations of 18 U.S.C. § 2320, and included a general recommendation that the applicable Sentencing Guidelines be increased, particularly for counterfeit drug offenses. On April 10, 2013, the Commission voted to amend § 2B5.3 to provide the new two-level enhancement when the offense involves a counterfeit drug. This amendment will go into effect on November 1, 2013, unless Congress and the President act to disapprove it. Because the guidelines are advisory only, though, this amendment can be cited before then to courts as a reason for varying from the current guidelines. See, e.g., United States v. Mateos, 623 F.3d 1350 (11th Cir. 2010) (Justice O’Connor, sitting by designation, holding that forthcoming changes to the sentencing guidelines inform both the sentencing and reviewing courts on the appropriate sentencing in a given case). h. Offense Involving Risk of Death or Serious Bodily Injury or Possession of a Dangerous Weapon Increases the Offense Level by 2—U.S.S.G. § 2B5.3(b)(5) If the offense involved conscious or reckless risk of death or serious bodily injury or possession of a dangerous weapon, the offense level is increased by 2. U.S.S.G. § 2B5.3(b)(5). If the resulting offense level is less than 14, then it must be increased to level 14. See, e.g., United States v. Maloney, 85 Fed. Appx. 252 (2d Cir. 2004) (applying 2-level enhancement for possession of a dangerous weapon in connection with conviction under 18 U.S.C. § 2318(a),(c)(3) and § 2, even though defendant was acquitted at trial of a felon-in-possession of a firearm charge). This subsection was last amended in response to the PROIP Act of 2008 to include offenses involving risk of death. U.S.S.G. App. C (Amendment 735); PRO-IP Act of 2008, Pub. L. No. 110-403, § 205, 122 Stat. 4256, 4262 (2008). This brought § 2B5.3 back into parallel with § 2B1.1, reflecting the Commission’s prior judgment that “aggravating conduct in connection with infringement cases should be treated under the guidelines in the same way it is treated in connection with fraud cases.” U.S.S.G. App. C (Amendment 590). VIII. Penalties, Restitution, and Forfeiture 327 This enhancement was partially motivated by the health and safety risks from counterfeit consumer products such as counterfeit batteries, airplane parts, and pharmaceuticals. See U.S.S.G. App. C (Amendments 590, 593). On April 10, 2013, the Commission voted to amend § 2B5.3 by adding a new § 2B5.3(b)(5) for offenses involving counterfeit drugs and renumbering the current § 2B5.3(b)(5) as § 2B5.3(b)(6). This amendment will go into effect on November 1, 2013, unless Congress and the President act to disapprove it. i. Offense Involving Counterfeit Military Goods and Services Under Certain Conditions Increases the Offense Level by 2 and Sets a Minimum Offense Level of 14—U.S.S.G. § 2B5.3(b)(7) (effective November 1, 2013) In an amendment scheduled to take effect November 1, 2013, if the offense involves counterfeit military goods and services the use, malfunction, or failure of which is likely to cause the disclosure of classified information, impairment of combat operations, or other significant harm to a combat operation, a member of the Armed Forces, or to national security, the offense level is increased by 2, and if the resulting offense level is less than level 14, then it is increased to level 14. See U.S.S.G. § 2B5.3(b)(7) (proposed). The proposed amendment also adds Commentary to § 2B5.3 to clarify that “other significant harm to a member of the Armed Forces” means significant harm other than serious bodily injury or death. If a military good or service is likely to cause serious bodily injury or death, one would still apply § 2B5.3(b)(5)(A) (conscious or reckless risk of serious bodily injury or death) [after November 1, 2013, § 2B5.3(b)(6)(A)]. Responding in part to the Administration’s White Paper, the National Defense Authorization Act for Fiscal Year 2012, Pub. L. No. 112-81, § 818(h), 125 Stat. 1298, 1497 (December 31, 2011), amended 18 U.S.C. § 2320 to add a new subsection (a)(3) that prohibits trafficking in counterfeit military goods and services, the use, malfunction, or failure of which is likely to cause serious bodily injury or death, the disclosure of classified information, impairment of combat operations, or other significant harm to a combat operation, a member of the Armed Forces, or national security. On April 10, 2013, the Commission voted to amend § 2B5.3 to provide the new two-level enhancement and the new minimum offense level of 14 for offenses involving counterfeit military goods and services with the aggravating circumstances set out above and make the corresponding amendment to the 328 Prosecuting Intellectual Property Crimes Commentary. These amendments will go into effect on November 1, 2013, unless Congress and the President act to disapprove them. Because the guidelines are advisory only, though, these amendments can be cited before then to courts as a reason for varying from the current guidelines. See, e.g., Mateos, 623 F.3d 1350 (Justice O’Connor, sitting by designation, holding that forthcoming changes to the sentencing guidelines inform both the sentencing and reviewing courts on the appropriate sentencing in a given case). j. Decryption or Circumvention of Access Controls May Increase the Offense Level—U.S.S.G. § 3B1.3 The 2-level enhancement for use of a special skill under U.S.S.G. § 3B1.3 “may apply” if the defendant decrypted or circumvented access controls. U.S.S.G. § 2B5.3 cmt. n.3. On November 1, 2007, the Commission changed this enhancement from mandatory to discretionary, after determining that “not every case involving de-encryption or circumvention requires the level of skill contemplated by the special skill adjustment.” Id. (Amendment 704). Because the note quoted above refers only to the circumvention of access controls, it is unclear whether the special skill enhancement also applies to decrypting or circumventing copy controls. There is no policy-related reason to treat access and copy controls differently at sentencing. In fact, U.S.S.G. § 3B1.3 applies to any defendant who commits an intellectual property crime while using a special skill. See Section C.2.i. of this Chapter for a more detailed description of what constitutes a special skill. This enhancement may not be assessed for use of a special skill if the adjustment under U.S.S.G. § 3B1.1 (Aggravating Role) is also assessed. See U.S.S.G. § 3B1.3. k. Departure Considerations The fourth application note for § 2B5.3 states that a departure may be warranted if the offense level determined under § 2B5.3 “substantially understates or overstates the seriousness of the offense,” such as: (i) when the offense substantially harmed the victim’s reputation in a way that is otherwise unaccounted for, including in calculating the infringement amount; (ii) when the offense was in connection with, or in furtherance of, a national or international organized criminal enterprise; and/or (iii) when the method used to calculate the infringement amount overstates the actual pecuniary harm to the victim. These three examples, however, are not exclusive. U.S.S.G. § 2B5.3 VIII. Penalties, Restitution, and Forfeiture 329 cmt. n.4 (noting that this is a “non-exhaustive list of factors” in considering departures); id. App. C (Amendments 590, 593, 704). On November 1, 2007, the Commission modified Application Note 4 to address downward as well as upward departures. Id. (Amendment 704); see United States v. Neuman, 406 Fed. Appx. 847, 852 (5th Cir. 2010) (finding that district court did not abuse its discretion in basing sentence on infringement amount instead of restitution amount where it was clear from the record that the court had duly considered that disparity, and had rejected a downward departure, under U.S.S.G. § 2B5.3 cmt. n.4(C). On April 10, 2013, the Commission voted to amend the Commentary to § 2B5.3 to add a new departure consideration for any offense sentenced under § 2B5.3 providing that a departure may be warranted if the offense resulted in death or serious bodily injury. See U.S.S.G. 2B5.3 cmt. n.4(D) (proposed). This amendment will go into effect on November 1, 2013, unless Congress and the President act to disapprove it. Because the guidelines are advisory only, though, this amendment can be cited before then to courts as a reason for varying from the current guidelines. See, e.g., Mateos, 623 F.3d 1350 (Justice O’Connor, sitting by designation, holding that forthcoming changes to the sentencing guidelines inform both the sentencing and reviewing courts on the appropriate sentencing in a given case). l. Vulnerable Victims—U.S.S.G. § 3A1.1(b) Intellectual property crime defendants are likely to qualify for an upward adjustment under U.S.S.G. § 3A1.1(b) if they knew or should have known that they were selling counterfeit products to vulnerable victims. A prime example of this would be selling counterfeit pharmaceuticals that are distributed or redistributed to sick patients. See United States v. Milstein, 401 F.3d 53, 74 (2d Cir. 2005) (affirming vulnerable victim adjustment for distributing counterfeit and misbranded drugs “to doctors, pharmacists, and pharmaceutical wholesalers, knowing that those customers would distribute the drugs to women with fertility problems and to Parkinson’s disease patients”). m. No Downward Departure for the Victim’s Participation in Prosecution The court may not depart downward on the ground that the victim participated in the prosecution. In United States v. Yang, 281 F.3d 534 (6th Cir. 2002), cert. denied, 537 U.S. 1170 (2003), on appeal after new sentencing hearing, 144 Fed. Appx. 521 (6th Cir. 2005), a prosecution for theft of trade 330 Prosecuting Intellectual Property Crimes secrets, mail fraud, wire fraud, and money laundering, the trial court departed downward 14 levels on the ground that the victim participated too much in the prosecution, specifically in calculating the loss it suffered. The Sixth Circuit reversed, concluding that “the victim’s participation in the prosecution is wholly irrelevant to either the defendant’s guilt or the nature or extent of his sentence,” and is therefore not a permissible basis for a downward departure. Yang, 281 F.3d at 545-46. 2. Offenses Involving the Economic Espionage Act (EEA) a. Applicable Guideline is § 2B1.1, Except for Attempts and Conspiracies Unlike most other intellectual property offenses, which are sentenced under U.S.S.G. § 2B5.3, completed EEA offenses (both § 1831 and § 1832) are sentenced under U.S.S.G. § 2B1.1. See U.S.S.G. App. A. The choice of U.S.S.G. § 2B1.1 instead of U.S.S.G. § 2B5.3 likely reflects the idea that EEA offenses are primarily about stolen property rather than infringement. The superficial difference between stealing and infringement is that one physically dispossesses the victim of his property and the latter does not. However, the EEA punishes those who steal trade secrets without dispossessing the victim of his trade secret, and even after a trade secret is physically stolen, the victim may still use the information itself. The overlap between misappropriation and infringement therefore makes U.S.S.G. § 2B1.1 an interesting fit for the EEA. An EEA attempt or conspiracy is sentenced under U.S.S.G. § 2X1.1 (Conspiracies, Attempts, and Solicitations), which uses the offense level calculated under U.S.S.G. § 2B1.1 and decreases the base offense level 3 levels “unless the defendant completed all the acts the defendant believed necessary for successful completion of the substantive offense or the circumstances demonstrate that the defendant was about to complete all such acts but for apprehension or interruption by some similar event beyond the defendant’s control.” U.S.S.G. § 2X1.1(b)(1), (2). The 3-point reduction will rarely apply in EEA attempt cases resulting from undercover stings because in those operations the defendant has generally completed all necessary acts short of the actual receipt of what the defendant believed was a trade secret. b. Base Offense Level—U.S.S.G. § 2B1.1(a) (2). The base offense level for a completed EEA crime is 6. U.S.S.G. § 2B1.1(a) VIII. Penalties, Restitution, and Forfeiture 331 c. Loss—U.S.S.G. § 2B1.1(b)(1) The defendant’s sentence is driven largely by the value of the misappropriated property. Under U.S.S.G. § 2B1.1(b)(1), the offense level increases according to the amount of the loss. i. Use Greater of Actual or Intended Loss This loss figure is “the greater of actual loss or intended loss.” U.S.S.G. § 2B1.1 cmt. n.3(A). “Actual loss” is “the reasonably foreseeable pecuniary harm that resulted from the offense,” whereas “intended loss (I) means the pecuniary harm that was intended to result from the offense; and (II) includes intended pecuniary harm that would have been impossible or unlikely to occur (e.g., as in a government sting operation, or an insurance fraud in which the claim exceeded the insured value).” Id. cmt. n.3(A)(i-ii). ii. Reasonable Estimates Acceptable Whatever method is chosen to calculate loss, the government’s calculation need not be absolutely certain or precise. “The court need only make a reasonable estimate of the loss.” U.S.S.G. § 2B1.1 cmt. n.3(C). iii. Methods of Calculating Loss Guideline § 2B1.1’s application notes outline a number of general methods for calculating the loss, many of which are included as methods to estimate the loss: • “[T]he reasonably foreseeable pecuniary harm that resulted from the offense,” U.S.S.G. § 2B1.1 cmt. n.3(A)(i) • “The fair market value of the property unlawfully taken, copied, or destroyed; or, if the fair market value is impracticable to determine or inadequately measures the harm, the cost to the victim of replacing that property,” Id. n.3(C)(i) • “In the case of proprietary information (e.g., trade secrets), the cost of developing that information or the reduction in value of that information that resulted from the offense,” Id. n.3(C)(ii) • “The cost of repairs to damaged property,” Id. n.3(C)(iii) • “The approximate number of victims multiplied by the average loss to each victim,” Id. n.3(C)(iv) • “The reduction that resulted from the offense in the value of equity securities or other corporate assets,” Id. n.3(C)(v) 332 Prosecuting Intellectual Property Crimes • • “More general factors, such as the scope and duration of the offense and revenues generated by similar operations,” Id. n.3(C)(vi) “[T]he gain that resulted from the offense as an alternative measure of loss[,] only if there is a loss but it reasonably cannot be determined,” Id. n.3(B) On November 1, 2009, the Commission amended Application Note 3(C), adding the word “copied” to subdivision (i), and inserting a new subdivision (ii) dealing specifically with proprietary information. U.S.S.G. App. C (Amendment 726). The first change addressed situations in which the owner of proprietary information actually retains possession, but because the information is unlawfully copied and/or disseminated, the information’s value declines. In such a case, the court may use the fair market value of the copied information in calculating loss. The second change was simply an effort to provide some direct explanation of how to estimate loss in a trade secrets case. Id. Nevertheless, in a trade secrets case, calculating the loss can be complicated. First, consider the situations under which the defendant can be convicted: (a) merely conspiring to misappropriate a trade secret that the victim has not fully exploited to create a product; (b) receiving a trade secret, but not using the trade secret; (c) stealing a trade secret at no cost; (d) stealing a trade secret for an agreed-upon bribe; (e) receiving a trade secret and using it to create a product that has not been completed; (f ) receiving a trade secret, using it to create a product, introducing the product, but not yet selling it; (g) receiving a trade secret, using it to create a product, and selling the product at a loss; (h) receiving the trade secret, using it, and selling the product at a profit, while the victim continues to profit from its own sales; and (i) receiving the trade secret, using it, and selling a product that displaces the victim’s sales. These situations do not exhaust the possibilities. They illustrate, however, several complicating factors: • whether the defendant paid anything for the secret; • whether the defendant was paid anything for the secret; • whether the defendant used the secret; • whether the defendant used the secret and made money from its use; and • whether the victim’s sales decreased, increased, or increased at a lower rate than they would have had the misappropriation not occurred. VIII. Penalties, Restitution, and Forfeiture 333 The final complicating factor is that trade secrets are, by definition, not traded in an open market that allows the easy calculation of a trade secret’s price or value. The variety of misappropriation scenarios, the variety of evidence available, and the broad principles of valuing trade secrets in criminal and civil law lead to one clear recommendation: prosecutors, agents, and courts should consider the variety of methods by which a trade secret can be valued, develop whatever evidence is reasonably available, and then be pragmatic about choosing which method to use, as long as it is equitable, appropriately punitive, and supported by the evidence. The cases bear this out. Criminal Cases Few reported federal criminal decisions describe how to value trade secrets, but those that do tend to focus on the trade secret’s research and development costs. In United States v. Four Pillars Enter. Co., 253 Fed. Appx. 502, 512 (6th Cir. 2007), the defendant company stole more than sixty adhesive formulas from victim Avery Dennison. At sentencing, an Avery employee testified that the research and development costs for the formula totaled $869,300. The Sixth Circuit found no error in the district court’s decision to accept this cost model. In United States v. Ameri, 412 F.3d 893 (8th Cir. 2005), an employee stole his employer’s proprietary software, which the evidence showed was at the heart of a $10 million contract, had no verifiable fair market value because it was not available separately, alternatively had a fair market value of $1 million per copy, and was developed for about $700,000. Id. at 900. Faced with these figures, the Eighth Circuit affirmed the trial court’s loss estimate of $1.4 million, which appears to be the $700,000 in development costs times 2, the number of copies the defendant made. Id. at 900-01. Finally, United States v. Kwan, No. 02 CR. 241(DAB), 2003 WL 22973515 (S.D.N.Y. Dec. 17, 2003), considered whether “proprietary” “hotel contact lists, hotel rate sheets, travel consortium contact lists, travel consortium rate sheets, and cruise operator rate sheets”—all useful in the travel industry—met the jurisdictional threshold for interstate transportation of stolen property under 18 U.S.C. § 2314 by being worth more than $5,000. Id. at *1. The court found most persuasive an argument for a value over $5,000 based on 334 Prosecuting Intellectual Property Crimes the documents’ cost of production, which it estimated by noting the salary of people who created the documents and the amount of time they would have spent gathering the information and creating the documents. Id. at *9 & n.12. In all these cases, the loss or market value was defined largely by development costs. Some civil trade secret cases have measured the replacement cost using the victim’s research and development costs. See Salsbury Labs., Inc. v. Merieux Labs., Inc., 908 F.2d 706, 714-15 (11th Cir. 1990) (holding that research and development costs for misappropriated vaccine were a proper factor to determine damages); cf. University Computing Co. v. Lykes-Youngstown Corp., 504 F.2d 518, 538 (5th Cir. 1974) (holding that development costs should be taken into consideration with a number of factors, including “the commercial context in which the misappropriation occurred”). But see Softel, Inc. v. Dragon Med. & Scientific Commc’ns, Inc., 118 F.3d 955, 969 (2d Cir. 1997) (holding that it is usually appropriate to measure damages based on development costs and importance of secret to plaintiff only after a defendant completely destroys the value of the trade secret). An interesting exception to using development costs to value trade secrets is United States v. Pemberton, 904 F.2d 515 (9th Cir. 1990), in which a legitimate buyer’s price was selected. After the defendant was convicted for receiving stolen property, namely technical landscape and irrigation design drawings for a 450-acre commercial development, the trial court had to select among valuation methods, including valuing the drawings at what the drawings were purportedly worth to defendant—zero; the $1,200 cost of the materials on which they were drawn; the $65,000 cost of replacing the drawings in full; and the $118,400 contract price for the drawings (80 percent of the full contract price, given that the drawings were 80 percent complete when stolen). Id. at 516 & n.1, 517. Without a price from an open market, since the drawings were unique, the appellate court affirmed the trial court’s choice of the $118,400 contract price. Id. at 517. Why use the buyer’s price in Pemberton rather than the development costs, as had been done in the Wilson, Ameri, and Kwan cases? There appear to be three differences. First, in Pemberton the buyer’s price came from a legitimate market transaction rather than a black-market transaction that would have undervalued the property. Second, in Pemberton, the buyer’s price was apparently higher than the development costs. Third, and this is related to the second point, in Pemberton the drawings that were stolen likely could have been used for one VIII. Penalties, Restitution, and Forfeiture 335 project only, the real estate development by the legitimate buyer, whereas the trade secrets in Wilson, Ameri, and Kwan included general information that could have been used over and over again by illegitimate buyers. Research and development costs for a one-off project are likely to be less than the legitimate buyer’s price (since this is the only opportunity the trade-secret holder can recover his overhead), whereas research and development costs for a replicable product or service will likely exceed a legitimate buyer’s price (since the tradesecret holder can recover his overhead through repeated sales). Another possible measure of loss in trade secrets cases is actual pecuniary loss. In United States v. Wilkinson, 590 F.3d 259 (4th Cir. 2010), the defendant pled guilty to several charges, including conspiracy to steal trade secrets, for his scheme to obtain fuel contracts from the Defense Energy Support Center (DESC) by paying a competitor’s employee for confidential bid information which would enable the defendant’s company to underbid the competitor. The Fourth Circuit remanded for resentencing, finding that the district court had failed to consider properly the government’s evidence of actual loss, even though the DESC never actually ended up paying out on the tainted contracts. The government’s expert witness calculated the loss based on the DESC’s administrative costs in preparing new bid packages, making spot purchases of fuel while it waited to award replacement contracts, and the ultimately higher costs DESC faced for the untainted replacement contracts. Id. at 265. Civil Cases Prosecutors should also be aware of how civil cases measure losses from trade secret misappropriation. See supra; cf. United States v. Olis, 429 F.3d 540, 546 (5th Cir. 2005) (holding that “[t]he loss guideline [in U.S.S.G. § 2B1.1] is skeletal because it covers dozens of federal property crimes,” and therefore “[t]he civil damage measure [for securities fraud] should be the backdrop for criminal responsibility both because it furnishes the standard of compensable injury for securities fraud victims and because it is attuned to stock market complexities”). Unfortunately, beyond reinforcing the criminal cases’ use of research and development costs, civil measures of damages provide little hard and fast guidance. The Uniform Trade Secrets Act echoes the Sentencing Guidelines’ generalities: Damages can include both the actual loss caused by misappropriation and the unjust enrichment caused by 336 Prosecuting Intellectual Property Crimes misappropriation that is not taken into account in computing actual loss. Uniform Trade Secrets Act § 3(a) (1985); see also Mike’s Train House, Inc. v. Lionel, L.L.C., 472 F.3d 398, 413-15 (6th Cir. 2006) (a plaintiff which is able to prove that it was damaged but that the defendant’s unjust enrichment exceeded the proven damages to plaintiff, is able to recover his own damages plus, to the extent not duplicative in amount, the defendant’s unjust enrichment). In determining damages under the Uniform Trade Secrets Act, courts base the trade secret’s market value on the victim’s loss or the defendant’s gain, depending on which measure appears to be more reliable or greater given the particular circumstances of the theft. See Vermont Microsystems, Inc. v. Autodesk Inc., 138 F.3d 449, 452 (2d Cir. 1998); University Computing Co. v. LykesYoungstown Corp., 504 F.2d 518 (5th Cir. 1974); Healthcare Advocates v. Affordable Healthcare Options, No. 09-5839, 2010 WL 4665956, at *2 (E.D. Pa. Nov. 18, 2010); Milgrim on Trade Secrets § 15.02(3)(c) (2012). With such broad principles, “the general law as to the proper measure of damages in a trade secrets case is far from uniform.” Telex Corp. v. International Bus. Machs. Corp., 510 F.2d 894, 930 (10th Cir. 1975) (concerning misappropriation of trade secrets and confidential information relating to electronic data processing systems). As might be expected, civil cases use a variety of methods to value trade secrets: • the value placed on the trade secrets by the parties; • the victim’s lost profits; • the defendant’s realized profits; • the defendant’s saved costs from misappropriation; • the research and development costs for the trade secret; and • a reasonable royalty to the victim, when there was otherwise no gain or loss. 1 Richard Raysman & Peter Brown, Computer Law: Drafting and Negotiating Forms § 6.03A (2012). When there is evidence for more than one measure, “the court will frequently award that amount which is most beneficial to the injured party.” Id. Civil cases often note that if the victim’s loss were the only appropriate measure of damages, someone caught red-handed stealing trade secrets could not be punished if he had not yet used the information to the owner’s detriment. VIII. Penalties, Restitution, and Forfeiture 337 As a result, in such circumstances most Uniform Trade Secrets Act cases have computed the trade secret’s market value by focusing on the defendant’s gain. See, e.g., University Computing, 504 F.2d at 536 (holding that damages for misappropriation of trade secrets are measured by the value of the secret to the defendant “where the [trade] secret has not been destroyed and where the plaintiff is unable to prove specific injury”); Salisbury Labs., Inc. v. Merieux Labs., Inc., 908 F.2d 706, 714 (11th Cir. 1990) (ruling that under Georgia’s UTSA, damages for misappropriation of trade secrets should be based on the defendant’s gain); SKF USA Inc. v. Bjerkness, 636 F. Supp. 2d 696 (N.D. Ill. 2009). Under the more recent Federal Sentencing Guidelines, the court may use a defendant’s gain as a loss for the victim in certain circumstances. See U.S.S.G. § 2B1.1 cmt. n.3(B) (2012). The Uniform Trade Secrets Act also provides that damages may be based, as with patent infringement, on a “reasonable royalty”—that is, the amount the thief would have had to pay the victim in licensing or royalty fees had he legitimately licensed the stolen technology: In lieu of damages measured by any other methods, the damages caused by misappropriation may be measured by imposition of liability for a reasonable royalty for a misappropriator’s unauthorized disclosure or use of a trade secret. Uniform Trade Secrets Act § 3(a) (1985). See, e.g., University Computing, 504 F.2d at 537. When the defendant has not yet realized sufficient profit to readily indicate the stolen information’s market value, the preferred estimate is the “reasonable royalty” (or “forced licensing”) measure. See Vitro Corp. of Am. v. Hall Chem. Co., 292 F.2d 678, 682-83 (6th Cir. 1961); see also Vermont Microsystems, Inc. v. Autodesk, Inc., 138 F.3d 449, 450 (2d Cir. 1998). Other federal cases using the “reasonable royalty” method include Mid-Michigan Computer Sys., Inc. v. Marc Glassman, Inc., 416 F.3d 505, 510-13 (6th Cir. 2005); Molex, Inc. v. Nolen, 759 F.2d 474 (5th Cir. 1985); University Computing Co., 504 F.2d 518; Secure Energy, Inc. v. Coal Synthetics, LLC, 708 F. Supp. 2d 923, 931-32 (E.D. Mo. 2010); LinkCo, Inc. v. Fujitsu Ltd., 232 F. Supp. 2d 182, 186-87 (S.D.N.Y. 2002); Carter Prods., Inc. v. Colgate-Palmolive Co., 214 F. Supp. 383 (D. Md. 1963). But calculating a reasonable royalty may prove more difficult and may unduly prolong or complicate sentencing in cases where the defendant has not 338 Prosecuting Intellectual Property Crimes yet manifested his intention to use the stolen technology and there is no readily ascertainable benchmark for determining a reasonable royalty. Practical Guidance on Gathering Evidence Because of the flexible nature of valuing trade secrets, prosecutors and investigators should try to obtain the following types of evidence, if available and applicable: • the amount the defendant paid for the trade secret; • the amount for which the defendant sold or tried to sell the trade secret; • the amount for which similar trade secret information sold in the legitimate open market (such as the merger/acquisition price for the trade secret); • a reasonable royalty, based on what a willing buyer would pay a willing seller for the technology in an arms-length transaction; • the trade secret owner’s research and development costs; • the market price that the defendant actually received or paid in exchange for the technology; and • any other methodology that calculates the reasonably foreseeable pecuniary losses caused by the defendant’s conduct. d. Intent to Benefit a Foreign Government, Instrumentality, or Agent— U.S.S.G. § 2B1.1(b)(5) The offense level is increased two points if the defendant knew or intended that the offense would benefit a foreign government, foreign instrumentality, or foreign agent. See U.S.S.G. § 2B1.1(b)(5). As discussed below, § 2B1.1(b) (5) will be superseded by a new § 2B1.1(b)(12) on November 1, 2013. e. Intent to Transport or Transmit the Trade Secret out of the United States or to Benefit a Foreign Government, Instrumentality, or Agent—U.S.S.G. § 2B1.1(b)(12) (effective November 1, 2013) In amendments scheduled to take effect November 1, 2013, the offense level is increased two points if the defendant knew or intended that the trade secret would be transported or transmitted out of the United States. See U.S.S.G. § 2B1.1(b)(12)(A) (proposed). Alternatively, the offense level is increased four points if the defendant knew or intended that the offense would benefit a foreign government, foreign instrumentality, or foreign agent, and if the resulting offense level is less than level 14, it is increased to level 14. See U.S.S.G. § 2B1.1(b)(12)(B) (proposed). VIII. Penalties, Restitution, and Forfeiture 339 In March 2011, the Office of the Intellectual Property Enforcement Coordinator transmitted a range of legislative proposals to Congress including a number or recommendations to enhance certain Guidelines, including those for theft of trade secrets. See Administration’s White Paper on Intellectual Property Enforcement Legislative Recommendations (March 2011), available at http://www.whitehouse.gov/sites/default/files/ip_white_paper.pdf. In response, the Foreign and Economic Espionage Penalty Enhancement Act of 2012, Pub. L. No. 112-269, § (3)(a), 126 Stat. 2442, 2442-43 (January 14, 2013), directed the United States Sentencing Commission to “review and, if appropriate, amend” the guidelines “applicable to persons convicted of offenses relating to the transmission or attempted transmission of a stolen trade secret outside of the United States or economic espionage, in order to reflect the intent of Congress that penalties for such offenses under the Federal sentencing guidelines and policy statements appropriately, reflect the seriousness of these offenses, account for the potential and actual harm caused by these offenses, and provide adequate deterrence against such offenses.” On April 10, 2013, the Commission voted to amend § 2B1.1 to provide the new two-level enhancement when a trade secret is transmitted outside the United States, and the new four-level enhancement—with a minimum level of 14— when the trade secret theft is intended to benefit a foreign government. These amendments will go into effect on November 1, 2013, unless Congress and the President act to disapprove them. Because the guidelines are advisory only, though, these amendments can be cited before then to courts as reasons for varying from the current guidelines. See, e.g., United States v. Mateos, 623 F.3d 1350 (11th Cir. 2010) (Justice O’Connor, sitting by designation, holding that forthcoming changes to the sentencing guidelines inform both the sentencing and reviewing courts on the appropriate sentencing in a given case). f. Sophisticated Means—U.S.S.G. § 2B1.1(b)(10)(C) If the offense involved “sophisticated means,” the offense level is increased by 2 levels, and if the resulting offense is less than 12, it must be increased to 12. U.S.S.G. § 2B1(b)(10)(C). “‘[S]ophisticated means’ means especially complex or especially intricate offense conduct pertaining to the execution or concealment of an offense,” which includes “hiding assets or transactions,” among other things. Id. cmt. n.8(B). The sophisticated means enhancement will often apply to trade secret offenses because these crimes are frequently committed by corporate insiders who have the need and opportunity to take extensive precautions to shield 340 Prosecuting Intellectual Property Crimes their actions from their employers. A defendant can receive the adjustment for sophisticated means in addition to the adjustment for use of a special skill under U.S.S.G. § 3B1.3. See United States v. Ojemon, 465 Fed. Appx. 69, 7172 (2d Cir. 2012); United States v. Rice, 52 F.3d 843, 851 (10th Cir. 1995) (“The purpose of the special skill enhancement is to punish those criminals who use their special talents to commit crime. In contrast, the sophisticated means and more than minimal planning enhancements [in predecessor guideline to § 2B1.1] are designed to target criminals who engage in complicated criminal activity because their actions are considered more blameworthy and deserving of greater punishment than a perpetrator of a simple version of the crime. We therefore see no double counting here.”); United States v. Olis, 429 F.3d 540, 549 (5th Cir. 2005), on remand, No. H-03-217-01, 2006 WL 2716048 (Sep. 22, 2006) (upholding loss calculation based on special skill and sophisticated means, but reducing resulting prison time under the U.S.S.G § 3553(a) factors); United States v. Minneman, 143 F.3d 274, 283 (7th Cir. 1998). g. Upward Departure Considerations—U.S.S.G. § 2B1.1 cmt. n.19(A) A non-exhaustive list of factors in which an upward departure should be considered is set forth in Application Note 19 to U.S.S.G. § 2B1.1. The factors that are most likely to be relevant in a trade secret case are intending, risking, and causing non-monetary harm, such as emotional harm, because many EEA cases involve disgruntled employees or former employees out for revenge. U.S.S.G. § 2B1.1 cmt. n.19(i),(ii). h. Downward Departure Considerations—U.S.S.G. § 2B1.1 cmt. n.19(C) Application Note 19(C) to U.S.S.G. § 2B1.1 suggests that a downward departure may be warranted if the offense level “substantially overstates the seriousness of the offense.” EEA defendants are likely to raise this as a basis for downward departure if the loss amount greatly outweighs the amount of the actual or intended gain or loss, as sometimes happens when the trade secret is valued by research and development costs. i. Abuse of a Position of Trust—U.S.S.G. § 3B1.3 Trade secret offenses committed by corporate insiders often deserve the 2-level adjustment for abuse of a position of trust under U.S.S.G. § 3B1.3. The adjustment is appropriate when the defendant had “professional or managerial VIII. Penalties, Restitution, and Forfeiture 341 discretion (i.e., substantial discretionary judgment that is ordinarily given considerable deference)” and the position of trust “contributed in some significant way to facilitating the commission or concealment of the offense.” Id. cmt. n.1. A defendant can receive the enhancements for abuse of a position of trust and sophisticated means simultaneously. See United States v. Ratliff, 376 Fed. Appx. 830, 836-41 (10th Cir. 2010); cf. United States v. Straus, 188 F.3d 520, 1999 WL 565502, at *5 (10th Cir. 1999) (holding that abuse-of-trust and more-than-minimal-planning enhancements, the latter in a predecessor to U.S.S.G. § 2B1.1(b)(10)(C), can be applied to same conduct simultaneously). j. Use of Special Skill—U.S.S.G. § 3B1.3 Trade secret defendants who use their specialized technical knowledge to understand and use the misappropriated trade secret will often qualify for a 2-level adjustment for use of a special skill under U.S.S.G. § 3B1.3. See, e.g., United States v. Lange, 312 F.3d 263, 270 (7th Cir. 2002) (“Drafting skills, including the use of AutoCAD, are ‘not possessed by members of the general public’, require time to master, and played a central role in the offense. A mechanical drafter is in the same category as a pilot or demolition expert—for those skills, too, may be learned outside the academy. The enhancement was proper.”). “‘Special skill’ refers to a skill not possessed by members of the general public and usually requiring substantial education, training, or licensing. Examples would include pilots, lawyers, doctors, accountants, chemists, and demolition experts.” U.S.S.G. § 3B1.3 cmt. n.4. Special skill includes any type of special skill, not just one gained through advanced education. In Lange, it applied to a mechanical drafter, an EEA defendant who committed his offense using his associate’s degree in graphic design and his ability to work with his former employer’s engineering drawings in AutoCAD. Lange, 312 F.3d at 270. A defendant can receive the adjustment for use of a special skill in addition to the adjustment for sophisticated means under U.S.S.G. § 2B1.1(b)(9)(C). See Ojemon, 465 Fed. Appx. at 71-72. k. No Downward Departure for Victim’s Participation in Developing the Case As noted in Section C.1.k. of this Chapter, the court may not depart downward on the ground that the victim participated in the prosecution. 342 Prosecuting Intellectual Property Crimes D. Restitution Victims have a right to “full and timely restitution as provided in law.” 18 U.S.C. § 3771(a)(6). “All who investigate and prosecute criminal cases play an important role in determining whether restitution is full and timely. The scope of the victim’s losses, the nexus between the victim’s losses and the crimes charged, what happened to ill-gotten gains, and the defendant’s ability to pay are all integral to the criminal prosecution. Restitution should be considered early in the investigation and throughout the prosecution.” U.S. Dep’t of Justice, Attorney General Guidelines for Victim and Witness Assistance, Art. V, H (2012), available at http://www.justice.gov/olp/pdf/ag_guidelines2012.pdf. In intellectual property cases, there are two types of victim: the owner of the intellectual property that was infringed or misappropriated, and any consumer who was lured into purchasing the infringing goods by fraud. Both types of victim usually qualify for restitution if they have suffered a loss. This section discusses restitution for intellectual property crimes. For more detailed guidance on restitution principles and procedures, prosecutors should consult the Attorney General Guidelines for Victim and Witness Assistance, cited above, as well as the U.S. Department of Justice, Prosecutor’s Guide to Criminal Monetary Penalties: Determination, Imposition and Enforcement of Restitution, Fines & Other Monetary Impositions (2003) (hereinafter, Prosecutor’s Guide to Criminal Monetary Penalties), available at http://dojnet.doj.gov/usao/eousa/ ole/usabook/mone/. 1. Restitution is Available—and Often Required—in Intellectual Property Prosecutions Most criminal intellectual property defendants must pay their victims restitution. Intellectual property offenses in Title 18 require restitution under the Mandatory Victims Restitution Act of 1996 (“MVRA”), codified in part at 18 U.S.C. § 3663A (“Mandatory restitution to victims of certain crimes”). Under the MVRA, restitution is mandatory following any “offense against property under [Title 18] ... including any offense committed by fraud or deceit ... in which an identifiable victim or victims suffered a pecuniary loss.” 18 U.S.C. § 3663A(c)(1)(A)(ii),(B). For offenses committed on or after October 13, 2008, the PRO-IP Act of 2008 made this explicit, creating a new section, 18 VIII. Penalties, Restitution, and Forfeiture 343 U.S.C. § 2323, dealing specifically with forfeiture, destruction and restitution for intellectual property offenses, which provides: (c) Restitution. — When a person is convicted of an offense under section 506 of title 17 or section 2318, 2319, 2319A, 2319B, or 2320, or chapter 90, of this title, the court, pursuant to sections 3556, 3663A, and 3664 of this title, shall order the person to pay restitution to any victim of the offense as an offense against property referred to in section 3663A(c)(1)(A) (ii) of this title. 18 U.S.C. § 2323(c); PRO-IP Act of 2008, Pub. L. No. 110-403, § 206, 122 Stat. 4256, 4263 (2008). The restitution provisions in the PRO-IP Act superseded an amendment passed only two years earlier in the Stop Counterfeiting in Manufactured Goods Act which made restitution mandatory for violations of 18 U.S.C. § 2320. See Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 109-181, § 1, 120 Stat. 285, 286 (2006); 18 U.S.C. § 2320(b)(4) (effective March 16, 2006 through October 12, 2008). The enactment of 18 U.S.C. § 2323 codified a longstanding body of case law. Intellectual property crimes are offenses against property in two senses: some defraud unwitting customers into paying money for infringing products, and all involve intellectual property, which is property as much as any tangible property. See, e.g., United States v. Carpenter, 484 U.S. 19, 26 (1987) (stating that confidential information, another type of intangible property, has “long been recognized as property”); United States v. Trevino, 956 F.2d 276, 1992 WL 39028 (9th Cir. 1992) (table) (in counterfeit trademark prosecution, affirming order of restitution to nuclear power plant victim that had purchased counterfeit circuit breakers). The handful of cases on point confirmed that intellectual property offenses are “offense[s] against property” for the purpose of § 3663A. See Beydoun, 469 F.3d at 107 (noting that a conviction under 18 U.S.C. § 2320 for trafficking in counterfeit cigarette papers was an “offense against property” under 18 U.S.C. § 3663A and thus required mandatory restitution, but finding that the district court calculated incorrectly the amount of restitution); United States v. Chalupnik, 514 F.3d 748, 751-52 (8th Cir. 2008) (similarly, noting that a conviction under 17 U.S.C. § 506 and 18 U.S.C. § 2319 for criminal copyright infringement was an “offense against property” under 18 U.S.C. § 3663A, but faulting the district court’s calculation of restitution); United States v. Chay, 281 F.3d 682, 686 (7th Cir. 2002) (noting that a conviction under 18 U.S.C. § 2318(a) for trafficking in 344 Prosecuting Intellectual Property Crimes counterfeit documents and packaging for computer programs was an “offense against property” under 18 U.S.C. § 3663A and thus required mandatory restitution); United States v. Hanna, No. 02 CR. 1364-01(RWS), 2003 WL 22705133, at *3 (S.D.N.Y. Nov. 17, 2003) (stating that a conviction under 18 U.S.C. § 2320 for trafficking in counterfeit trademarked handbags and other goods requires full restitution under 18 U.S.C. §§ 3663A, 3664); see also United States v. Cho, 136 F.3d 982, 983 (5th Cir. 1998) (mentioning restitution in trademark counterfeiting case); United States v. Manzer, 69 F.3d 222, 229-30 (8th Cir. 1995) (upholding restitution award of $2.7 million in mail fraud, wire fraud, and copyright infringement prosecution for the sale of modification and cloning packages for unauthorized decryption of premium channel satellite broadcasts); United States v. Sung, 51 F.3d 92, 96 (7th Cir. 1995) (mentioning restitution in trademark counterfeiting case); United States v. Bohai Trading Co., 45 F.3d 577, 579 (1st Cir. 1995) (same—restitution amount of $100,000); United States v. Hicks, 46 F.3d 1128, 1995 WL 20791, at *3 (4th Cir. 1995) (table) (upholding restitution award in satellite decryption and copyright case). These cases support the proposition that restitution is mandatory even for intellectual property offenses committed prior to enactment of § 2323 on October 13, 2008. Restitution also is mandatory for trademark violations committed between passage of the Stop Counterfeiting in Manufactured Goods Act on March 16, 2006, and passage of the PRO-IP Act on October 13, 2008, under the version of 18 U.S.C. § 2320 in effect during that period. See Stop Counterfeiting in Manufactured Goods Act, Pub. L. No. 108-482, § 1, 120 Stat. 285, 286 (2006); 18 U.S.C. § 2320(b)(4) (effective March 16, 2006 through October 12, 2008). There are two statutory exceptions to mandatory restitution in § 3663A: “if (A) the number of identifiable victims is so large as to make restitution impracticable; or (B) determining complex issues of fact related to the cause or amount of the victim’s losses would complicate or prolong the sentencing process to a degree that the need to provide restitution to any victim is outweighed by the burden on the sentencing process.” 18 U.S.C. § 3663A(c) (3). Defendants can be expected to argue for one or both of these exceptions in cases of online copyright piracy that involve a large number of copyrighted works owned by a large number of victims, in cases involving retail counterfeit goods that were sold to a large number of defrauded customers, and in trade secret cases that involve complex issues of valuation. “This ‘exception’ was VIII. Penalties, Restitution, and Forfeiture 345 intended to be used sparingly, and the court is expected to use every means available, including a continuance of the restitution determination of up to 90 days, if necessary, to identify as many victims and harms to those victims as possible.” Prosecutor’s Guide to Criminal Monetary Penalties at 28 (citing 18 U.S.C. § 3664(d)(5) and United States v. Grimes, 173 F.3d 634 (7th Cir. 1999)). Department policy also requires that when this exception does apply, “where forfeited assets are involved, prosecutors should consult with the Criminal Division’s Asset Forfeiture and Money Laundering Section (AFMLS) to determine the most effective way of returning forfeited assets to victims,” and “[i]n cases with multiple defendants, the court should be asked to address joint and several liability.” U.S. Dep’t of Justice, Attorney General Guidelines for Victim and Witness Assistance, Art. V, H.1.g (2012). Prosecutors should also ask the court to order restitution “for those victims and harms the court can identify,” Prosecutor’s Guide to Criminal Monetary Penalties at 30 (discussing similar exception for discretionary restitution). How to ensure restitution in such situations is addressed below in the discussion of determining the restitution amount. Another possible exception to mandatory restitution may exist for criminal trademark, service mark, and certification mark cases under 18 U.S.C. § 2320 in which the mark-holder neglected to use the ® symbol (or other proper notice) and the defendant lacked actual notice that the mark was registered. In those cases, however, even though restitution might not be awarded to the markholder, it should still be awarded to any customers of the defendant who were defrauded into buying what they thought were authentic goods or services. See Section E.3. of Chapter III of this Manual. In addition, certain intellectual property offenses are simply not covered by the mandatory restitution provisions in 18 U.S.C. § 3663A, which apply only to an “offense against property under this title [18].” 18 U.S.C. § 3663A(c) (1)(A)(ii). First, this excludes non-Title 18 offenses, such as violations of the DMCA, see 17 U.S.C. § 1204, and unauthorized reception of cable and satellite service, see 47 U.S.C. §§ 553(b)(2), 605. Second, this excludes even Title 18 crimes which are not offenses against property. Violations of 18 U.S.C. § 2319A (bootlegging) committed prior to passage of § 2323 may fall into this category. Defendants can argue that those crimes are not offenses against property on the ground that bootleg music and music video recordings do not infringe copyrighted property, see Section F. of Chapter II of this Manual, or any other type of property, and that any 346 Prosecuting Intellectual Property Crimes revenues from these offenses do not represent an actual pecuniary harm to the victim because bootleg music and music video recordings do not decrease artists’ sales. Prosecutors may wish to consult CCIPS at (202) 514-1026 to discuss restitution in § 2319A convictions for offenses committed prior to October 13, 2008. Fortunately, even for intellectual property offenses committed before passage of § 2323 and not covered by the mandatory restitution provisions, there are other mechanisms to obtain restitution. First, restitution can always be made part of a plea agreement. See 18 U.S.C. § 3663(a)(3). Second, a court can order discretionary restitution in any intellectual property criminal case as a condition of probation or of supervised release after imprisonment. See 18 U.S.C. §§ 3563(b)(2) (probation), 3583(d) (supervised release). A good example of these principles is United States v. Lexington Wholesale Co., 71 Fed. Appx. 507 (6th Cir. 2003), in which a defendant was convicted for selling infant formula repackaged with counterfeit trademarks and without an accurate “use by” date, which resulted in one count for criminal trademark violations under 18 U.S.C. § 2320 and one count for misbranded food or drugs under Title 21. 71 Fed. Appx. at 508. The sentencing court imposed restitution to the victim of the misbranding count only, which the defendant argued was improper because restitution is authorized only for offenses under Title 18, not Title 21. Id. The appellate court affirmed restitution on the ground that it was authorized as a condition of probation and also by the plea agreement. Id. at 508-09. Finally, restitution is available for pre-PRO-IP Act violations of 18 U.S.C. § 2319A under the discretionary provisions of 18 U.S.C. § 3663(a)(1) (A), which do not limit restitution to offenses against property. In deciding whether to award discretionary restitution, the court must consider not only the victim’s loss, but also the defendant’s financial resources. 18 U.S.C. § 3663(a)(1)(B)(i); see also § 3563(b)(2) (allowing court to order restitution to a victim as a condition of probation “as [] reasonably necessary” and without regard to the limitations on restitution in § 3663(a) and § 3663A(c) (1)(A)). Mandatory restitution requires full restitution. Prosecutor’s Guide to Criminal Monetary Penalties at 29-30. There is, however, a presumption for full restitution, even in discretionary restitution cases. Id. The Department’s policy is to require full restitution in discretionary cases (assuming the defendant’s current or future economic circumstances warrant it), but in discretionary cases to require nominal payment if economic circumstances so warrant. Id. at 30. VIII. Penalties, Restitution, and Forfeiture 347 With respect to awarding discretionary restitution, the court should also consider whether “the complication and prolongation of the sentencing process ... outweighs the need to provide restitution.” 18 U.S.C. § 3663(a)(1) (B)(ii). Again, however, the Department advises that “prosecutors should only ask the court to apply this provision narrowly, i.e., only to whatever portion of restitution it may be applicable, and to impose restitution for those victims and harms the court can identify.” Prosecutor’s Guide to Criminal Monetary Penalties at 30. Department policy requires consideration of the availability of restitution when making charging decisions, and to structure plea agreements to provide restitution whenever possible. See U.S. Dep’t of Justice, Attorney General Guidelines for Victim and Witness Assistance, Art. V, H.1.b (2012) (stating that “[w]hen exercising their discretion, prosecutors should give due consideration to the need to provide full restitution to the victims of federal criminal offenses,” among other charging considerations), V, H.1.d (stating that “[w]hen reasonably possible, plea agreements should identify victims’ losses for purposes of restitution and address the manner of payment”). If one of the charges would require restitution, the plea agreement should require full restitution even if the defendant pleads guilty to a charge that would not require restitution. Id. (citing USAM 9-16.320). 2. Identifying Victims Who Qualify for Restitution Prosecutors should consider all victims who suffered a loss, from the intellectual property rights-holder, to distributors, and to the direct purchaser and ultimate consumer of the infringing good. Generally, the intellectual property rights-holder whose works were infringed or misappropriated qualifies for restitution. This is clear in cases involving copyrights, trademarks, and trade secrets. As noted in Section D.1. of this Chapter, however, DMCA offenses do not qualify for mandatory restitution. The court, of course, may still order discretionary restitution. See United States v. Whitehead, 532 F.3d 991, 993 (9th Cir. 2008) (in a DMCA case, finding reasonable a sentence including restitution). Moreover, the company whose technological measures are circumvented may be entitled to restitution if the company also owns copyrighted works that were infringed as a result of the circumvention. United States v. Oliver, No. 8:02CR3, 2005 WL 1691049, at *5 (D. Neb. July 18, 2005) (“Even if Sony had made money as a result of the defendant’s criminal conduct [in modifying Sony Playstations to play pirated 348 Prosecuting Intellectual Property Crimes games in violation of the DMCA], it simply does not negate the fact that the defendant is guilty of violating Sony’s copyright [by modifying the game machines to play pirated Sony games].”). Similarly, satellite service providers may be eligible for restitution from the sellers of circumvention devices for the amount customers would have paid for the extra channels they obtained fraudulently. See Brereton, 196 Fed. Appx. at 693 (affirming restitution order based on loss to DIRECTV of payments from top customers who purchased illicit access cards from defendant); United States v. Manzer, 69 F.3d 222, 230 (8th Cir. 1995) (affirming restitution order for defendant who sold modified TV descrambling devices even though he was not actually convicted of a violation of 47 U.S.C. § 605(e)(3)(C)(i)(II) because this was nevertheless part of his scheme to defraud underlying his wire fraud conviction); United States v. Hicks, 46 F.3d 1128, 1995 WL 20791, at *1 (4th Cir. Jan. 20, 1995) (table) (holding that defendant convicted of selling modified satellite TV descrambling devices in violation of 47 U.S.C. § 605(e)(4) was not liable for restitution to descrambling device manufacturers because they had been fully compensated when they originally sold their devices, but ordering restitution to satellite service providers for what customers would have paid for the additional channels they could receive because of the defendant’s modifications). Industry associations that represent intellectual property rights holders can, in some circumstances, help identify rights holders and receive and distribute the restitution to the rights holders. For a listing of industry contacts, see Appendix G or contact CCIPS at (202) 514-1026. At least one court has held that a distributor, in addition to the rights holders, may qualify for restitution. In United States v. Chalupnik, 514 F.3d 748 (8th Cir. 2008), the court found that BMG Columbia House, which sells copyrighted CDs and DVDs, was a victim for purposes of restitution, but ultimately declined to order restitution because BMG could not prove lost sales from defendant’s scheme to sell discarded BMG discs to used record stores. Id. at 753-54. See Section D.3. of this Chapter. Defrauded purchasers—if any—are entitled to restitution as well. See, e.g., United States v. Trevino, 956 F.2d 276, 1992 WL 39028 (9th Cir. 1992) (table) (in counterfeit trademark prosecution, affirming order of restitution to nuclear power plant victim that had purchased counterfeit circuit breakers). A defendant who has defrauded a large number of consumers can be expected to argue that restitution is not required because the class of defrauded consumers is impracticably large or difficult to identify. See 18 U.S.C. § 3663A(c)(3). VIII. Penalties, Restitution, and Forfeiture 349 There are procedures for ordering restitution for victims who can be identified by name but cannot presently be located at a particular address. See United States v. Berardini, 112 F.3d 606, 609-12 (2d Cir. 1997). Consumers who knew that they were purchasing counterfeits generally do not qualify as victims, because they have not been harmed. Distinguishing between consumers who were and were not defrauded may be a challenge. In determining whether an involved party qualifies as a victim for the purpose of restitution, the court will distinguish between those harmed by the defendant’s relevant conduct and those harmed by the offense of conviction. (The rest of this paragraph consists largely of excerpts from the Prosecutor’s Guide to Criminal Monetary Penalties at 32, with minor edits.) The court is statutorily authorized to impose restitution only to identifiable victims of the acts that are part of the offense of conviction. In Hughey v. United States, 495 U.S. 411, 413 (1990), the Supreme Court held that the restitution statutes limit restitution to “the loss caused by the specific conduct that is the basis of the offense of conviction.” Restitution is not authorized for acts merely related to the offense of conviction, such as acts that are within “relevant conduct” under guideline sentencing (U.S.S.G. § 1B1.3), but are outside the actual offense of conviction itself. Under the primary restitution statutes, amended after the Hughey decision, a victim is “a person directly and proximately harmed as a result of the commission of an offense for which restitution may be ordered.” 18 U.S.C. §§ 3663A(a)(2), 3663(a)(2). This includes, in a case where the offense of conviction includes a scheme, conspiracy, or pattern of criminal activity, “any person directly harmed by the defendant’s criminal conduct in the course of the scheme, conspiracy, or pattern” of criminal activity. Id. Therefore, prosecutors should charge such offenses to indicate the specific nature and full extent of the acts that constitute the scheme, conspiracy, or pattern of which the offense of conviction is involved, in order to permit the broadest imposition of restitution. If the acts for which restitution is sought are outside the offense of conviction and cannot be otherwise tied to a scheme, pattern, or conspiracy that is an element of the offense of conviction, then restitution is unavailable. Under this rule, restitution is generally not triggered by one kind of act if the offense of conviction describes another kind of act, even if the acts are logically related in purpose or intent. See, e.g., United States v. Blake, 81 F.3d 498 (4th Cir. 1996) (court denied restitution to victims for use of stolen credit cards where offense of conviction was possession of stolen credit cards); United States 350 Prosecuting Intellectual Property Crimes v. Hayes, 32 F.3d 171 (5th Cir. 1994); cf. In re Doe, 264 Fed. Appx. 260, 26364 (4th Cir. 2007) (court denied restitution to petitioner seeking restitution for addiction to prescription pain medication from defendant pharmaceutical company’s misbranding offense where she provided no evidence that she relied on any false or misleading information). Other courts apply this rule less strictly. For example, to determine the existence of a scheme and what acts it included for purposes of restitution, some courts will consider the facts alleged in the indictment, proven at trial, or admitted in the plea colloquy. See, e.g., United States v. Ramirez, 196 F.3d 895 (8th Cir. 1999); United States v. Jackson, 155 F.3d 942 (8th Cir. 1998); United States v. Hughey, 147 F.3d 423, 438 (5th Cir. 1998) (suggesting that restitution might have been triggered by acts not in the indictment had they been established by the trial record) If no scheme, conspiracy, or pattern encompasses the acts for which injured parties seek restitution, restitution will likely be limited in two respects. First, a party who was injured solely by an act outside the offense of conviction—such as a party whose losses were proved only as relevant conduct—cannot obtain restitution. Second, a party who was injured by the offense of conviction can obtain restitution only for the offense-of-conviction acts and not acts proved only as relevant conduct at sentencing—even relevant conduct that counted towards the loss or infringement amount; however, some courts may still allow restitution for this type of relevant conduct if it is alleged in the indictment or proved at trial, not just at sentencing. The exception to both these limitations is, of course, restitution ordered pursuant to a stipulation in a plea agreement. See 18 U.S.C. § 3663(a)(3). Application of these principles to an intellectual property crime occurred in United States v. Manzer, 69 F.3d 222 (8th Cir. 1995), in which the court ordered $2.7 million in restitution from a defendant convicted of mail fraud, wire fraud, and criminal copyright infringement for trafficking in cloned computer chips. The cloned chips would allow satellite descrambling devices to decrypt cable satellite signals without authorization. The defendant objected to the $2.7 million restitution award on the ground that it included sales not identified in the indictment. Id. at 229-30. The Eighth Circuit disagreed, holding that the mail and wire fraud counts alleged a scheme to defraud that “encompass[ed] transactions beyond those alleged in the counts of conviction,” including the sales not otherwise identified in the indictment. Id. at 230 (citation and internal quotation marks omitted). Note that the restitution VIII. Penalties, Restitution, and Forfeiture 351 might have been limited to the sales alleged in the indictment if the defendant had pleaded to or been convicted of only the copyright charge. There are several ways to help ensure that restitution is awarded for harm caused. As part of any plea deal, the government should require the defendant to plead to the counts that offer maximum restitution, or the government should insist upon a comprehensive plea agreement that provides restitution to the victims of relevant offense conduct (whether the statutes or offenses of conviction provide for it or not). See 18 U.S.C. § 3663(a)(3) (allowing court to order restitution as provided in plea agreement); Prosecutor’s Guide to Criminal Monetary Penalties at 22-24. At the beginning of the case, prosecutors should draft the indictment to maximize restitution. Id. at 21. As the Prosecutor’s Guide to Criminal Monetary Penalties counsels: Prosecutors should avoid the “scheme” restitution pitfalls by: a) Charging offenses that involve the statutory elements of an “intent to defraud” or “intent to deceive” in the traditional wire/mail fraud (or conspiracy) format, where the scheme (or conspiracy) is described in detail and incorporated by reference into each specific act count; and b) Making sure the dates alleged as the beginning and end of the scheme or conspiracy include all acts in furtherance of the scheme or conspiracy for which restitution should be imposed. Id. at 22. Moreover, “[s]imply tracking the statutory language of such offenses does not clarify if the acts of conviction are part of a scheme, i.e., whether different kinds of acts make up a scheme to ‘defraud’ or ‘deceive.’ Numerous restitution orders have been vacated in such cases due to ambiguity of the ‘scheme’ issue.” Id. The same concerns apply to whether acts in addition to those alleged as overt acts of a conspiracy can qualify as part of the conspiracy for purposes of awarding restitution. The Prosecutor’s Guide to Criminal Monetary Penalties discusses specific ways to structure restitution provisions in a plea agreement to maximize restitution. Id. at 23-24. 3. Determining a Restitution Figure Once the government has identified the people and entities who might be classified as victims—consumers who were defrauded and intellectual property 352 Prosecuting Intellectual Property Crimes rights holders—the next question is how to calculate what the victims are owed, if anything. To begin with, as discussed in the prior section, the restitution award must be based on the loss caused by the defendant’s offense of conviction. After determining which victims and transactions qualify for restitution, the government must determine how the restitution should be calculated. The most important principle is that restitution is intended to make the victims whole by compensating them for their losses. See 18 U.S.C. §§ 3663(a)(1) (B)(i)(I), 3663A(b), 3664(a); U.S.S.G. § 5E1.1(a). This principle has several consequences. First, the restitution order should require the defendant to return any of the victim’s property that he took. See 18 U.S.C. §§ 3663(b)(1)(A), 3663A(b) (1)(A), 3664(f )(4)(A). This principle applies across all intellectual property offenses: • In trade secret offenses, the defendant should be required to return the trade secret and any other items that he took from the owner of the trade secret. • In infringement cases, the defendant should be required to return the money he accepted from the customers he defrauded (if any—in some cases the customers knew that they were receiving counterfeits). Although the defendant might argue that he is entitled to offset the value of the goods the defrauded customers received, often that value is next to nothing. Compare United States v. West Coast Aluminum Heat Treating Co., 265 F.3d 986, 992 (9th Cir. 2001) (“And, by reducing the loss calculation to account for the partial benefit gained by the government, the district court remained consistent with the rule that the victim’s loss should be offset by the victim’s benefit.”), and United States v. Matsumaru, 244 F.3d 1092, 1109 (9th Cir. 2001) (holding that restitution of the purchase price for the business the victim paid for and was promised but did not receive, must be offset by the value of the van and business license he did receive), with United States v. Angelica, 859 F.2d 1390, 1394 (9th Cir. 1988) (affirming trial court’s refusal to offset restitution award by value of substitute property given to victims, because there was “no abuse of discretion in the district court’s decision to disregard the value of the inexpensive garnets that were unwanted by the victims and substituted for their diamonds as part of the fraudulent scheme”), and United States v. Austin, 54 F.3d 394, 402 (7th Cir. 1995) VIII. Penalties, Restitution, and Forfeiture 353 • 354 (holding that “even if the [counterfeit or misrepresented art] pieces Austin sold ... were not completely worthless, $0 was the best estimate of their worth” for purposes of calculating loss). In infringement cases—and perhaps trade secret cases as well—the defendant should also compensate the intellectual property rightsholder victims for any sales that he diverted from them. See United States v. Milstein, 481 F.3d 132, 136-37 (2d Cir. 2007) (finding, in criminal trademark prosecution, that restitution should be based on the rights holders’ “lost sales,” as provided in the civil trademark provisions of the Lanham Act, 15 U.S.C. § 1117(a)(1)-(2); those sales represented the “value of the property” cited in the Victim and Witness Protection Act of 2008, 18 U.S.C. § 3663(b)(1)(B)); United States v. Sung, 51 F.3d 92, 94 (7th Cir. 1995) (holding, in criminal trademark prosecution, that “[r]estitution in a criminal case is the counterpart to damages in civil litigation”). If the defendant’s conduct did not divert any sales from the victim, then the victim may not be entitled to restitution. See United States v. Chalupnik, 514 F.3d 748, 755 (8th Cir. 2008) (reversing restitution order because victim offered only speculation as to lost sales); United States v. Hudson, 483 F.3d 707, 710-11 (10th Cir. 2007) (reversing restitution order because no evidence that victim Microsoft suffered lost sales as result of defendant’s conduct); United States v. Foote, No. CR.A. 00-20091-01-KHV, 2003 WL 22466158, at *7 (D. Kan. July 31, 2003) (refusing to award restitution to trademark-holders because the government proposed no reliable estimate of the victim’s losses and citing cases for the need to prove lost profits). A defendant is most likely to divert sales from the victim when he has defrauded customers into thinking that his product or service is authentic, although he may have a counter-argument if his prices were sufficiently under the authentic price that his customers would have been unlikely to pay the victim the full price for the real thing. A consumer who pays $20 for a highquality (or even a low-quality) fake purse might not have paid full price ($120 to $700) for the real purse, and thus his purchase of the fake might not represent a lost sale to the victim. Similarly, some computer users who download a $60,000 engineering program for free from an infringing website or peer-to-peer network may be “trophy hunters” who would not have paid full price for an authorized copy, whereas other downloaders may be businesspeople who would have paid full price had the free download not been available. Restitution orders Prosecuting Intellectual Property Crimes • • • should differentiate between these situations, to the extent possible. Prosecutors might also try to introduce evidence establishing that the availability of high-quality infringing works affected the market for the victim’s product. See Brooktree Corp. v. Advanced Micro Devices, Inc., 977 F.2d 1555, 1579 (Fed. Cir. 1992) (civil case upholding “actual damages” calculation based on evidence that plaintiff had been forced to lower its prices as a result of defendant’s infringing activities). Restitution based on lost sales is generally not calculated by the defendant’s gain, but rather by the victim’s loss. Foote, 2003 WL 22466158, at *7. For example, in United States v. Martin, 64 Fed. Appx. 129 (10th Cir. 2003), the total value of the items infringed was $1,143,395, but the restitution equaled only $395,000—the retail value multiplied by the rights-holder’s profit margin. As Martin illustrates, restitution is based on lost net profits, not on total retail price. See United States v. Beydoun, 469 F.3d 102, 108 (5th Cir. 2006). Nevertheless, the defendant has no right to have his own costs offset against his gain. United States v. Chay, 281 F.3d 682, 686-87 (7th Cir. 2002). When the evidence of infringement consists of the defendant’s inventory of infringing product rather than his actual sales—and the defendant therefore argues against any restitution for lack of actual diverted sales—the government may argue that the inventory is a reasonable estimate of the defendant’s past sales. This argument is likely to be most persuasive when the defendant’s inventory is counted after he has been in business for a long time. Inventory is more likely to overstate past sales when a business is just starting out, and to understate past sales when the business has been successful and ongoing for a substantial time. At least one court has held that restitution in a criminal intellectual property case can be based on the amount of statutory damages that the victim could have obtained from the defendant in a civil case, but this was a case in which the statutory damages likely understated the actual damages. See United States v. Manzer, 69 F.3d 222, 229-30 (8th Cir. 1995) (upholding restitution award in descrambler case of $2.7 million for 270 cloning devices based on minimum statutory damages of $10,000 per device, where victim provided loss figure of over $6.8 million). Statutory damages are available in civil suits for a variety of intellectual property violations. See, e.g., 15 U.S.C. § 1117(c) (statutory VIII. Penalties, Restitution, and Forfeiture 355 • damages of $1,000-$200,000 (up to $2 million if infringement was willful) per counterfeit mark per type of goods or services); 17 U.S.C. § 504(c) (statutory damages of $750-$30,000 (up to $150,000 if infringement was willful) per infringed work); 47 U.S.C. § 605(e) (3)(C)(i)(II) (statutory damages of $10,000-$100,000 per violation). See also Roger D. Blair & Thomas F. Cotter, An Economic Analysis of Damages Rules in Intellectual Property Law, 39 Wm. & Mary L. Rev. 1585, 1651-72 (1998) (discussing economic theory of statutory damages in copyright law). If the defendant earned a profit from his crime but the court finds that restitution is too difficult to calculate, the court can nevertheless take away the defendant’s gain by imposing a fine in the amount of his gain. See Foote, 2003 WL 22466158, at *7. Second, the restitution order should compensate the victim for any money spent to investigate the defendant’s conduct, whether during the victim’s own investigation or while helping the government investigate and prosecute. These costs often arise in intellectual property cases: employers conduct internal investigations into their employees’ theft of trade secrets, and copyright and trademark-holders often hire private investigators to monitor and investigate suspected infringers. The mandatory and discretionary restitution statutes both authorize restitution “for lost income and necessary child care, transportation, and other expenses [related to / incurred during] participation in the investigation or prosecution of the offense or attendance at proceedings related to the offense.” 18 U.S.C. §§ 3663(b)(4), 3663A(b)(4). These provisions have been interpreted to cover not only the victim’s expenses in helping the government, but also the costs of the victim’s own investigation. See United States v. Brown, 150 Fed. Appx. 575 (8th Cir. 2005) (per curiam) (awarding restitution to victim company for staff investigation costs into reconstructing and correcting financial records related to defendant’s embezzlement, where defendant contested proof of amount but not whether investigative costs as a category are awardable); United States v. Beaird, 145 Fed. Appx. 853 (5th Cir. 2005) (per curiam) (affirming $200,000 award of restitution for attorney’s fees and litigation expenses associated with assisting the FBI’s investigation); United States v. Gordon, 393 F.3d 1044, 1049, 1056-57 (9th Cir. 2004) (discussing reimbursement of investigative costs in depth, in case affirming $1,038,477 in restitution for costs of company’s internal investigation and responses to grand jury subpoenas), cert. denied, 126 S. Ct. 472 (2005); see also United States v. Susel, 429 F.3d 782, 784 (8th Cir. 2005) (per curiam) (affirming award 356 Prosecuting Intellectual Property Crimes of software company’s administrative and transportation expenses during participation in the investigation and prosecution of the offense in criminal copyright case). But see United States v. Saad, 544 F. Supp. 2d 589, 592 (E.D. Mich. 2008) (denying restitution for investigative and legal costs incurred by victim who pursued civil litigation arising from defendant’s criminal conduct). Third, as explained above in Section D.1. of this Chapter, in deciding whether to award discretionary restitution, the court must consider not only the victim’s loss, but also the defendant’s financial resources. 18 U.S.C. § 3663(a) (1)(B)(i). A presumption for full restitution exists even in discretionary restitution cases. Prosecutor’s Guide to Criminal Monetary Penalties at 29-30. Unless economic circumstances warrant nominal payment, Department policy requires full restitution in discretionary cases. Id. at 30. In no case shall the fact that a victim has received or is entitled to receive compensation with respect to a loss from insurance or any other source be considered in determining the amount of restitution. 18 U.S.C. § 3664(f )(1)(B). Fourth, victims have an important role in helping to determine the appropriate amount of restitution. The government must consult with witnesses and the court to consider victims’ evidence at sentencing. See 42 U.S.C. § 10607(c)(3)(G); U.S. Dep’t of Justice, Attorney General Guidelines for Victim and Witness Assistance, Art. IV, I.2 (2012). See generally Chapter X of this Manual (Victims). The criminal intellectual property statutes similarly require the court to consider victims’ evidence at sentencing. See 18 U.S.C. §§ 2319(d), 2319A(d), 2319B(e), 2320(e). The pre-sentence report must also include a verified assessment of victim impact in every case. Fed. R. Crim. P. 32(d)(2)(B). Trade associations can be very helpful in providing victim impact statements, particularly when an offense involves a large quantity and variety of infringing products. See the listing of intellectual property contacts in Appendix G of this Manual. E. Forfeiture In criminal intellectual property cases, forfeiture can serve several important functions. Forfeiting infringing items removes them from the stream of commerce so they cannot be sold or redistributed. Forfeiting the tools and equipment that defendants use to commit intellectual property crimes—ranging from manufacturing equipment to computers to domain names used by infringing websites—prevents their use to commit further IP VIII. Penalties, Restitution, and Forfeiture 357 crime. Forfeiting the proceeds of intellectual property crime—the revenues and profits—prevents their reinvestment in a criminal enterprise. Finally, forfeiture can serve as a powerful deterrent. For IP offenses committed on or after October 13, 2008, forfeiture is fairly straightforward. The Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 created a new section, 18 U.S.C. § 2323, which expressly authorizes forfeiture for intellectual property offenses: (a) Civil forfeiture. (1) Property subject to forfeiture. The following property is subject to forfeiture to the United States Government: (A) Any article, the making or trafficking of which is, prohibited under section 506 of title 17, or section 2318, 2319, 2319A, 2319B, or 2320, or chapter 90, of this title. (B) Any property used, or intended to be used, in any manner or part to commit or facilitate the commission of an offense referred to in subparagraph (A). (C) Any property constituting or derived from any proceeds obtained directly or indirectly as a result of the commission of an offense referred to in subparagraph (A). (2) Procedures. The provisions of chapter 46 relating to civil forfeitures shall extend to any seizure or civil forfeiture under this section. For seizures made under this section, the court shall enter an appropriate protective order with respect to discovery and use of any records or information that has been seized. The protective order shall provide for appropriate procedures to ensure that confidential, private, proprietary, or privileged information contained in such records is not improperly disclosed or used. At the conclusion of the forfeiture proceedings, unless otherwise requested by an agency of the United States, the court shall order that any property forfeited under paragraph (1) be destroyed, or otherwise disposed of according to law. (b) Criminal forfeiture. 358 Prosecuting Intellectual Property Crimes (1) Property subject to forfeiture. The court, in imposing sentence on a person convicted of an offense under section 506 of title 17, or section 2318, 2319, 2319A, 2319B, or 2320, or chapter 90, of this title, shall order, in addition to any other sentence imposed, that the person forfeit to the United States Government any property subject to forfeiture under subsection (a) for that offense. (2) Procedures. (A) In general. The forfeiture of property under paragraph (1), including any seizure and disposition of the property and any related judicial or administrative proceeding, shall be governed by the procedures set forth in section 413 of the Comprehensive Drug Abuse Prevention and Control Act of 1970 (21 U.S.C. 853), other than subsection (d) of that section. (B) Destruction. At the conclusion of the forfeiture proceedings, the court, unless otherwise requested by an agency of the United States shall order that any-(i) forfeited article or component of an article bearing or consisting of a counterfeit mark be destroyed or otherwise disposed of according to law; and (ii) infringing items or other property described in subsection (a)(1)(A) and forfeited under paragraph (1) of this subsection be destroyed or otherwise disposed of according to law. PRO-IP Act of 2008, Pub. L. No. 110-403, § 206, 122 Stat. 4256, 4262-63 (2008); 18 U.S.C. § 2323. Notably, the PRO-IP Act makes criminal forfeiture mandatory for all offenses covered by the act. See 18 U.S.C. § 2323(b)(1). For intellectual property offenses committed prior to passage of the PROIP Act, forfeiture is governed by a complex web of forfeiture statutes. This Chapter is not a definitive guide to forfeiture law, but rather it provides a basic overview of the forfeiture remedies available in IP crimes. Prosecutors with questions concerning forfeiture practice and procedure should contact the forfeiture expert in their office or the Criminal Division’s Asset Forfeiture and Money Laundering Section at (202) 514-1263. VIII. Penalties, Restitution, and Forfeiture 359 1. Property Subject to Forfeiture Intellectual property crimes give rise to three general categories of forfeitable property: 1) Contraband items, which include infringing copyrighted copies and phonorecords; goods, labels, documentation, and packaging that bear counterfeit trademarks, service marks, or certification marks; and unauthorized recordings of live musical performances. See 49 U.S.C. § 80302(a)(6) (defining “contraband”). These items are subject to forfeiture under the PRO-IP Act, see 18 U.S.C. § 2323(a)(1)(A), and they were generally forfeitable prior to its enactment on October 13, 2008. See, e.g., 18 U.S.C. § 2320(b)(3)(A)(iii). 2) Proceeds derived from the commission of an IP offense. These are subject to forfeiture under the PRO-IP Act, see 18 U.S.C. § 2323(a)(1)(C), and they were usually forfeitable prior to its enactment. See, e.g., 18 U.S.C. § 1834(a)(1) (effective October 11, 1996 through October 12, 2008); 18 U.S.C. 2320(b)(3) (A)(i) (effective March 16, 2006 through October 12, 2008). 3) Facilitating property, that is, property that was used to commit or facilitate the IP offense, such as plates, molds or masters used to produce copyright-infringing works; computers, tools, equipment, and supplies used to produce counterfeit goods; and vehicles used to traffic in any of the above. Such property is subject to forfeiture under the PRO-IP Act, see 18 U.S.C. § 2323(a)(1)(B); prior to the act’s passage, forfeiture of facilitating property was available in many cases, but its availability varied substantially depending on the specific IP offense, the type of property, and the type of forfeiture sought; see, e.g., 18 U.S.C. § 1834(a)(2) (effective October 11, 1996 through October 12, 2008); 18 U.S.C. 2320(b)(3)(A)(ii) (effective March 16, 2006 through October 12, 2008). 2. Overview of Forfeiture Procedures There are three types of forfeiture procedures: administrative, civil, and criminal. This section gives a brief overview and includes a table that 360 Prosecuting Intellectual Property Crimes summarizes the types of forfeiture available for each kind of property, organized by intellectual property offense. a. Administrative Forfeiture Proceedings Administrative forfeiture occurs when a law enforcement agency forfeits property in an administrative, non-judicial matter. As with the other types of forfeiture procedure, administrative forfeiture is available only pursuant to a specific statute that authorizes such a procedure. Administrative forfeiture commences once an agency seizes property and then sends or publishes notice of the property seizure within the prescribed deadlines. If nobody responds to the notice by filing a claim of ownership claim within the allotted time, the property is forfeited without involving a prosecutor or judge. If a claim is filed, the seizing agency must either return the property or seek forfeiture through a judicial procedure. With the passage of the PRO-IP Act on October 13, 2008, administrative forfeiture is now available for all IP offenses except violations of the DMCA. See 18 U.S.C. § 2323(a)(2). Administrative forfeiture is also available for some IP offenses under several other statutes, including: 17 U.S.C. § 603(c) (copyright-infringing imports and exports); 19 U.S.C. § 1526(e) (trademarkinfringing imports); 18 U.S.C. § 981(d) and 19 U.S.C. §§ 1607-09 (proceeds); 49 U.S.C. § 80304 (facilitating property). Real property and personal property (other than monetary instruments) that are worth more than $500,000 can never be forfeited in an administrative proceeding. See 19 U.S.C. § 1607; 18 U.S.C. § 985. b. Civil and Criminal Proceedings Unlike administrative forfeiture proceedings, civil and criminal forfeiture are judicial actions that require the involvement of prosecutors and the courts. Criminal forfeiture is an in personam proceeding that begins with a forfeiture allegation in an indictment and is then executed as part of a defendant’s sentence. It thus requires a conviction and is limited to property belonging to the defendant that was involved in the offense of conviction. Criminal forfeiture cannot reach a third-party’s property, even if the defendant used the third-party’s property to commit the crime. Whereas criminal forfeiture is an in personam action against the defendant, civil forfeiture is an in rem action against the property itself. This means that VIII. Penalties, Restitution, and Forfeiture 361 civil forfeiture proceedings can reach property regardless of who owns it, if the government can prove that the property was derived from or used to commit a crime. Civil forfeiture proceedings are not part of a criminal case at all. The burden of proof is a preponderance of the evidence, and civil forfeiture proceedings can dispose of property even without a criminal conviction or the filing of any criminal charges. c. Table of Forfeiture Provisions Arranged by Criminal IP Statute The following table indicates the types of forfeiture available for intellectual property offenses committed since passage of the PRO-IP Act on October 13, 2008. For a listing of the types of forfeiture available prior to that, see Appendix I. Note that administrative forfeiture is generally available for vessels used to transport contraband items pursuant to 49 U.S.C. § 80304. Note also that even where forfeiture of proceeds from intellectual property offenses is not provided for expressly, it may be available indirectly through money laundering statutes. Criminal Copyright Infringement Administrative 362 Infringing Items Yes. • 17 U.S.C. §§ 602-603 (prohibiting imports and exports of infringing copies). • 18 U.S.C. § 2323(a)(2) (permitting administrative forfeiture of infringing items forfeitable civilly). • 19 U.S.C. §§ 1595a, 1607-09 (forfeiture & seizure by CBP of infringing items). Facilitating Property Yes. • 18 U.S.C. § 2323(a)(2) (permitting administrative forfeiture of facilitating property forfeitable civilly). • 19 U.S.C. §§ 1595a, 1607-09 (forfeiture & seizure by CBP). Proceeds Yes. • 18 U.S.C. § 981(d) (permitting administrative forfeiture of proceeds forfeitable civilly). • 18 U.S.C. § 2323(a)(2) (same). Prosecuting Intellectual Property Crimes Civil Infringing Items Yes. • 17 U.S.C. §§ 602-603. • 18 U.S.C. § 2323(a)(1)(A). Facilitating Property Yes. • 18 U.S.C. § 2323(a)(1)(B). Proceeds Yes. • 18 U.S.C. §§ 981(a)(1)(C) & 2323(a) (1)(C). Criminal Infringing Items Yes (mandatory) . • 17 U.S.C. §§ 602-603. • 18 U.S.C. § 2323(b)(1) (mandating criminal forfeiture of property forfeitable civilly). • 28 U.S.C. § 2461(c) (permitting criminal forfeiture of property forfeitable civilly). Facilitating Property Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Proceeds Yes (mandatory). • 18 U.S.C. § 981(a)(1)(C). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Digital Millennium Copyright Act Administrative No. Civil No. Criminal No. VIII. Penalties, Restitution, and Forfeiture 363 Economic Espionage Act (Trade Secret Theft) Administrative Contraband Yes. • 18 U.S.C. § 2323(a)(2). Facilitating Property Yes. • 18 U.S.C. § 2323(a)(2). Proceeds Yes. • 18 U.S.C. § 2323(a)(2). Civil Contraband Yes. • 18 U.S.C. § 2323(a)(1)(A). Facilitating Property Yes. • 18 U.S.C. § 2323(a)(1)(B). Proceeds Yes. • 18 U.S.C. § 2323(a)(1)(C). Criminal Contraband Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Facilitating Property Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Proceeds Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Counterfeit/Illicit Labels, Documentation, and Packaging for Copyrighted Works Administrative 364 Counterfeit/Infringing Items Yes. • 18 U.S.C. § 2323(a)(2). • 19 U.S.C. §§ 1595a, 1607-09. Facilitating Property Yes. • 18 U.S.C. § 2323(a)(2). • 19 U.S.C. §§ 1595a, 1607-09. Proceeds Yes. • 18 U.S.C. § 2323(a)(2). Prosecuting Intellectual Property Crimes Civil Counterfeit/Infringing Items Yes. • 18 U.S.C. § 2323(a)(1)(A). Facilitating Property Yes. • 18 U.S.C. § 2323(a)(1)(B). Proceeds Yes. • 18 U.S.C. § 981(a)(1)(C). • 18 U.S.C. § 2323(a)(1)(B). Criminal Counterfeit/Infringing Items Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Facilitating Property Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Proceeds Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Unauthorized Fixations of Live Musical Performances (“Bootlegging”) Administrative Unauthorized Recordings Yes. • 18 U.S.C. § 2319A(c). • 18 U.S.C. § 2323(a)(2). • 19 U.S.C. § 1595a, 1607-09. Facilitating Property Yes. • 18 U.S.C. § 2323(a)(2). • 19 U.S.C. § 1595a, 1607-09. Proceeds Yes. • 18 U.S.C. § 2323(a)(2). Civil Unauthorized Recordings Yes. • 18 U.S.C. § 2319A(c). • 18 U.S.C. § 2323(a)(1)(A). Facilitating Property Yes. • 18 U.S.C. § 2323(a)(1)(B). Proceeds Yes. • 18 U.S.C. § 981(a)(1)(C). • 18 U.S.C. § 2323(a)(1)(C). VIII. Penalties, Restitution, and Forfeiture 365 Criminal Unauthorized Recordings Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Facilitating Property Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Proceeds Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Unauthorized Recording of Motion Pictures (“Camcording”) Administrative Unauthorized Recordings Yes. • 18 U.S.C. § 2323(a)(2). • 19 U.S.C. § 1595a, 1607-09. Facilitating Property Yes. • 18 U.S.C. § 2323(a)(2). • 19 U.S.C. § 1595a, 1607-09. Proceeds Yes. • 18 U.S.C. § 2323(a)(2). Civil Unauthorized Recordings Yes. • 18 U.S.C. § 2323(a)(1)(A). Facilitating Property Yes. • 18 U.S.C. § 2323(a)(1)(B). Proceeds Yes. • 18 U.S.C. § 2323(a)(1)(C). Criminal 366 Unauthorized Recordings Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Facilitating Property Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Proceeds Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Prosecuting Intellectual Property Crimes Goods, Services, Labels, Documentation, and Packaging with Counterfeit Marks Administrative Counterfeit Items Yes. • 18 U.S.C. § 2323(a)(2). • 19 U.S.C. § 1526(e). • 19 U.S.C. §§ 1595a & 1607-09. Facilitating Property Yes. • 18 U.S.C. § 2323(a)(2). • 19 U.S.C. §§ 1595a & 1607-09. Proceeds Yes. • 18 U.S.C. § 981(d). • 18 U.S.C. § 2323(a)(2). Civil Contraband Yes. • 18 U.S.C. § 2323(a)(1)(A). Facilitating Property Yes. • 18 U.S.C. § 2323(a)(1)(B). Proceeds Yes. • 18 U.S.C. § 981(a)(1)(C). • 18 U.S.C. § 2323(a)(1)(C). Criminal Contraband Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Facilitating Property Yes (mandatory). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). Proceeds Yes (mandatory). • 18 U.S.C. § 981(a)(1)(C). • 18 U.S.C. § 2323(b)(1). • 28 U.S.C. § 2461(c). VIII. Penalties, Restitution, and Forfeiture 367 3. Choosing a Forfeiture Procedure Although the prosecutor may commence parallel civil and criminal forfeiture cases to keep all avenues of forfeiture open, various factors may affect which procedure is best to pursue: • Substitute assets. In criminal proceedings, the court can enter a money judgment against the defendant for the property’s value or can order the forfeiture of substitute assets if the property has been dissipated or cannot be found. • Burden of proof. In civil proceedings, the government need only prove that a crime was committed and that the property derived from or facilitated the crime by a preponderance of the evidence. In criminal cases, the government must prove beyond a reasonable doubt that a crime was committed and that the defendant committed the crime, although the nexus between the property and the offense need be proved only by a preponderance of the evidence. • Criminal conviction as a prerequisite. Civil forfeiture does not require a conviction. This is especially important if the government wants to forfeit the property of fugitives or defendants who have died, or if the government can prove that the property was involved in a crime but cannot prove the wrongdoer’s specific identity. Moreover, civil proceedings may be brought against any property derived from either a specific offense or from an illegal course of conduct, and therefore is not limited to property involved in the offense(s) of conviction. • Ownership of property. Criminal forfeiture reaches property only if it is owned by the defendant, or was at the time of the offense giving rise to the forfeiture. Civil forfeiture should be considered if the prosecutor seeks to forfeit proceeds or facilitation property that the defendant does not own. • Discovery and disclosure obligations. Civil forfeiture, governed by civil discovery rules, can result in early or unwanted disclosure of information through traditional civil discovery mechanisms such as interrogatories and depositions, and it is subject to stringent deadlines. • Attorneys’ fees. If the government brings an unsuccessful action for civil forfeiture, it may be liable for the owner’s attorneys’ fees. • Efficiency. Administrative forfeiture is preferred whenever available— generally, when no one is contesting the forfeiture—as it can dispose of certain forfeiture matters quickly in a non-judicial setting. 368 Prosecuting Intellectual Property Crimes 4. Civil Forfeiture in Intellectual Property Matters With the passage of the PRO-IP Act on October 13, 2008, civil forfeiture is now available for all intellectual property offenses except violations of the DMCA. See 18 U.S.C. § 2323(a). Again, the government need only prove that the crime was committed; it need not convict a specific defendant of the crime. a. Proceeds The government can seek civil forfeiture of the proceeds of all IP offenses except violations of the DMCA. See 18 U.S.C. § 2323(a)(1)(C). In addition, the Civil Asset Forfeiture Reform Act of 2000 (CAFRA) amendments to 18 U.S.C. § 981—a general civil forfeiture statute—permit civil forfeiture of the proceeds of certain IP offenses. The CAFRA amendments permit the government to seek civil forfeiture of “[a]ny property, real or personal, which constitutes or is derived from proceeds traceable to,” among other things, any offense defined as a specified unlawful activity in the money laundering provisions at 18 U.S.C. § 1956(c)(7). 18 U.S.C. § 981(a)(1)(C). Specified unlawful activities include criminal copyright infringement and trademark counterfeiting, 18 U.S.C. § 1956(c)(7)(D) (citing 18 U.S.C. §§ 2319, 2320), as well as any offense listed as racketeering activity in 18 U.S.C. § 1961(1). Section 1961, in turn, lists not only §§ 2319 and 2320 violations, but also violations of 18 U.S.C. § 2318 (counterfeit labels, documentation, and packaging for copyrighted works) and § 2319A (bootleg musical recordings). b. Infringing Items, Other Contraband, and Facilitating Property Civil forfeiture of infringing and other contraband items, as well as facilitating property, is available for all IP offenses except violations of the DMCA. See 18 U.S.C. §§ 2323(a)(1)(A), (B). In addition, there are special civil forfeiture provisions applicable to unauthorized fixations imported into the United States, see 18 U.S.C. § 2319A (unauthorized fixations of live musical performances), and to infringing copies imported to or exported from the United States. See 17 U.S.C. §§ 602-603. c. Innocent Owner Defense In most civil forfeiture actions, the innocent owner defense allows an owner to challenge the forfeiture on the ground that he was unaware that the property was being used for an illegal purpose, or took all reasonable steps under the circumstances to stop it. See United States v. 2001 Honda Accord EX, VIII. Penalties, Restitution, and Forfeiture 369 245 F. Supp. 2d 602 (M.D. Pa. 2003) (holding that CAFRA preserved the rule that the burden of proof shifts to the claimant to establish the innocent owner defense); United States v. 2526 Faxon Avenue, 145 F. Supp. 2d 942 (W.D. Tenn. 2001) (holding that CAFRA requires the claimant to prove the affirmative innocent owner defense by a preponderance of the evidence). There are some exceptions, however, most notably for importation offenses, and therefore prosecutors may wish to consult with the Department’s Asset Forfeiture and Money Laundering Section at (202) 514-1263 if an innocent owner is likely to submit a claim. d. Victims’ Ability to Forfeit Property Note also that some IP rights holders may obtain certain civil seizures that can complicate the government’s criminal prosecution, not to mention its forfeiture proceedings. Mark-holders have an ex parte remedy for seizing infringing products and manufacturing equipment. 15 U.S.C. § 1116(d). Mark-holders may also petition the court for seizure orders during a civil action against an infringer under 15 U.S.C. § 1114. Authority for an ex parte seizure order is provided at 15 U.S.C. § 1116(d)(1)(A). Mark-holders who seek such an order must give reasonable notice to the United States Attorney for the judicial district in which the order is sought, after which the United States Attorney “may participate in the proceedings arising under such application if such proceedings may affect evidence of an offense against the United States.” 15 U.S.C. § 1116(d)(2). The mark-holder’s application may be denied “if the court determines that the public interest in a potential prosecution so requires.” Id. If the mark-holder’s application is granted, then the seizure must be made by a federal, state, or local law enforcement officer. See 15 U.S.C. § 1116(d)(9). Similar ex parte seizure remedies are available to rights holders in copyright and counterfeit or illicit labels cases. See 17 U.S.C. § 503; 18 U.S.C. § 2318(e). Prosecutors may need to participate in these civil proceedings in order to preserve evidence relevant to an incipient or ongoing criminal case; to contest the issuance of an order; to preserve an ongoing investigation; or to inform the mark-holder of his ability to initiate a parallel civil case to seize, forfeit, and destroy equipment used to manufacture the counterfeit trademark goods. 5. Criminal Forfeiture in IP Matters As noted above, criminal forfeiture is an in personam action, and thus is available only once a defendant has been convicted, and then it is limited to 370 Prosecuting Intellectual Property Crimes property belonging to the defendant. See United States v. Totaro, 345 F.3d 989, 995 (8th Cir. 2003) (holding that criminal forfeiture is in personam, because if it allowed the forfeiture of a third party’s interest, the forfeiture would become an in rem action and the third party could contest the forfeiture on more than ownership grounds); United States v. O’Dell, 247 F.3d 655, 680 (6th Cir. 2001) (recognizing that criminal forfeiture “entitles the government to forfeiture of a convicted defendant’s interests and nothing more”) (citation omitted); United States v. Gilbert, 244 F.3d 888, 919 (11th Cir. 2001) (“Because it seeks to penalize the defendant for his illegal activities, in personam forfeiture reaches only that property, or portion thereof, owned by the defendant.”) (citation omitted), superseded on other grounds as recognized in United States v. Marion, 562 F.3d 1330, 1341 (11th Cir. 2009). The relation back doctrine, however, codified at 21 U.S.C. §§ 853(c) and 853(n)(6), provides that the government’s interest in forfeitable property vests at the time of the offense giving rise to the forfeiture, and that property transferred to a third party after that time may be forfeited. Even though criminal forfeiture is executed after conviction, the government should plan for criminal forfeiture during the investigation and at indictment. Pre-indictment seizure warrants can be used to seize infringing items (whether or not they are the property of a target). Moreover, the indictment should include separate forfeiture charges that identify any property that is forfeitable pursuant to the charged offenses. For forfeiture language to include in an indictment, prosecutors should consult the forfeiture expert in their office or the Criminal Division’s Asset Forfeiture and Money Laundering Section at (202) 514-1263. Criminal forfeiture is available for all IP offenses except violations of the DMCA. See 18 U.S.C. § 2323(b). a. Proceeds Generally, the government can obtain criminal forfeiture of proceeds from IP offenses whenever those proceeds are civilly forfeitable. See 18 U.S.C. § 2323(b)(1); 28 U.S.C. § 2461(c). Independently, where a defendant has engaged in a monetary transaction involving the proceeds of an intellectual property offense, “knowing that the property involved in a financial transaction represents the proceeds of some form of unlawful activity”—regardless of whether the crime is listed in 18 U.S.C. § 1956(c)(7)—the defendant may also be charged, and the proceeds VIII. Penalties, Restitution, and Forfeiture 371 subject to forfeiture, under the money laundering statute directly. See United States. v. Turner, 400 F.3d 491 (7th Cir. 2005) (holding that the defendant need not know the actual source of the money, but only that it came from “some illegal activity”); see also United States v. Khalil, No. CR. A. 95-577-01, 1999 WL 455698 (E.D. Pa. June 30, 1999) (forfeiture involving counterfeiting popular music). b. Infringing Items, Other Contraband, and Facilitating Property Similarly, criminal forfeiture of contraband from, and facilitating property for, IP offenses is available whenever those materials are civilly forfeitable. See 18 U.S.C. § 2323(b)(1). 6. Domain Name Forfeiture Increasingly, IP crimes are being perpetrated by website operators who are either unknown or outside the criminal jurisdiction of the United States. Their domain names, however, which point visitors to the sites, are often controlled by registrars and registries inside the United States. While it may be impractical or impossible to prosecute the operators themselves, forfeiture of the domain names may well be appropriate if they are facilitating the sale of infringing or counterfeit goods. Domain name forfeiture can be a high-visibility action with an important deterrent effect. It is most suitable, however, when a website is being used solely or largely for illegal activities. One must consult with the Criminal Division’s Asset Forfeiture and Money Laundering Section at (202) 514-1263 if the domain name is used for a combination of legal and illegal activities, such as constitutionally protected speech mixed with illegal transactions, or the domain name is used to run an ongoing business that is not engaging in predominately illegal activity. The forfeiture statutes define “property” to include intangible property, such as licenses and rights. See 18 U.S.C. § 981(a)(1)(E); 21 U.S.C. § 853(b) (2); United States v. Dicter, 198 F.3d 1284 (11th Cir. 1999) (medical license). Registrants have intangible rights in their domain names. Kremen v. Cohen, 337 F.3d 1024, 1029 (9th Cir. 2003). Those rights could be characterized as either property rights or contract rights. See, e.g., Dorer v. Arel, 60 F. Supp. 2d 558, 561 (E.D. Va. 1999). To forfeit a domain name, it is necessary to prove a nexus between the domain and the criminal offense. See 18 U.S.C. § 981(a); 21 U.S.C. § 853(a). 372 Prosecuting Intellectual Property Crimes Often, the easiest way to establish this nexus is to argue that the domain facilitates the offense. In civil forfeiture, to prove that a domain name facilitates the offense, it is necessary to show a “substantial connection” between the domain name and the offense. 18 U.S.C. § 981(c)(3) (civil forfeiture). A substantial connection or nexus can be shown by demonstrating that the domain name points to a computer that, in turn, is used in the offense. For example: • the domain name points to a web server which hosts an online pharmacy selling counterfeit drugs; or • the domain name points to a file server or cyber locker that offers pirated movies, music, or software for download. a. The Steps in Domain Name Forfeiture Below is a brief summary of the domain name forfeiture process. For more specific direction, and to obtain copies of sample documents, please contact CCIPS at (202) 514-1026 or the Criminal Division’s Asset Forfeiture and Money Laundering Section at (202) 514-1263. i. Seize (and Restrain) the Domain Name A domain name is restrained by ordering the registrar not to permit the registrant to move the domain name to another registrar. This prevents the registrant from moving the domain name to a registrar outside the United States. A domain name is seized by placing it in a state where it no longer points to any server. Any email sent to the domain will bounce; any web browers trying to download a page from the domain will get a “host not found” error. For IP crimes, the simplest approach is to seize and restrain the domain name civilly, using a seizure warrant issued under 18 U.S.C. § 981(b), which is made applicable by 18 U.S.C. § 2323(a)(2) to all IP crimes except DMCA violations. The investigative agency applies ex parte for a warrant. The warrant is granted if “there is probable cause to believe that the property is subject to forfeiture.” 18 U.S.C. § 981(b)(2)(B). There are two criminal forfeiture methods of seizure for domain names, both of which are made applicable by 18 U.S.C. § 2323(b)(2)(A) to all IP crimes except DMCA violations. The first method is to obtain a protective order under 21 U.S.C. § 853(e)(1). This is simplest to do right after an indictment, but it can also be done before an indictment. These orders have VIII. Penalties, Restitution, and Forfeiture 373 nationwide scope. 21 U.S.C. § 853(l). Protective orders, however, do not allow one to “seize” the domain name by turning it off. The second and preferred method, which does permit turning off the domain name, is to obtain a “warrant of seizure” issued under 21 U.S.C. § 853(f ). The standard of proof is “probable cause to believe that the property to be seized would, in the event of a conviction, be subject to forfeiture,” and that a protective order will not be sufficient. Id. These warrants have nationwide scope. 21 U.S.C. § 853(l). To establish that a protective order is not sufficient, one must establish the need to turn off the domain name now. For most sites peddling infringing or counterfeit goods, this should be fairly straightforward— unless the domain name is turned off, customers will continue to purchase unsafe or substandard goods, and rights holders will continue to suffer lost sales. ii. Forfeit the Domain Name When a domain name is forfeited, it becomes property of the United States. The former registrant loses all rights to, and control over, the domain name. If this is a criminal seizure (i.e., the defendant owns the domain name), the indictment or information must identify the domain name as property to be forfeited. Fed. R. Crim. P. 32.2(a). One should include the domain names in the description of property to be forfeited, for example: “any personal property … including, but not limited to, the following Internet domain names: illegaldrugs.com.” One should identify only the second-level domain names and should not include the prefixes “www” or “http” or refer to the domain names as “websites.” iii. Forfeiture as Part of a Plea Agreement Domain name forfeiture can and ought to be included in a plea agreement, especially if the defendant was using the associated website to market counterfeit and/or infringing goods. If there is a parallel civil forfeiture proceeding, the defendant can agree not to contest forfeiture there. Otherwise, the defendant should consent in writing—the paperwork is ordinarily available from the registrar—to the voluntary transfer of the domain name to the United States. iv. The Government’s Use of the Domain Name Once the United States successfully seizes a domain name, it retains possession until the registration period expires. Many domain names are 374 Prosecuting Intellectual Property Crimes registered only for a year or two at a time. Once that period expires, the seizing agency would have to renew the registration or the name would go back on the open market. The seizing agency may choose to post its own message or banner at the domain informing visitors that the name was seized because it was facilitating the sale of counterfeit or infringing goods in violation of federal law. The agency can then monitor the number of visitors who view the banner in order to measure its effect. 7. Interbank Account Seizures of Foreign Bank Funds In 2001, Congress enacted 18 U.S.C. § 981(k) as part of the USA Patriot Act. See Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, Pub. L. No. 10756, § 319, 115 Stat. 272, 311-12 (2001). This civil forfeiture provision allows the United States to recover criminal proceeds that have been deposited in a foreign bank account by filing a civil forfeiture action—not against the funds in the foreign account itself, but against the funds that the foreign bank has on deposit in the United States at a domestic financial institution. It is not necessary for the Government to establish that the seized funds are directly traceable to the funds that were deposited into the foreign financial institution. Only the person who owned the forfeitable funds at the time they were deposited into the foreign bank has standing to contest the forfeiture. The foreign bank does not have standing to object to the forfeiture action. Though the provision was aimed originally at terrorism, it can be useful in IP investigations. Used judiciously, it facilitates the seizure of proceeds from the sale of counterfeit and infringing goods by website operators who are outside United States criminal jurisdiction, and/or in countries with no extradition treaty with the U.S.—yet depend primarily on U.S. customers whose payments must pass through a domestic financial institution before moving into foreign accounts. The Criminal Division’s Asset Forfeiture and Money Laundering Section must approve the seizure of funds under § 981(k). VIII. Penalties, Restitution, and Forfeiture 375 376 Prosecuting Intellectual Property Crimes IX. Charging Decisions A. Introduction In determining whether to charge an intellectual property crime, federal prosecutors should generally consider the same factors that are weighed with respect to any other federal offense. The principal resource is Chapter 9-27.000 of the United States Attorneys’ Manual (USAM) (“Principles of Federal Prosecution”). Ordinarily, the prosecutor “should commence or recommend Federal prosecution if he/she believes that the person’s conduct constitutes a Federal offense and that the admissible evidence will probably be sufficient to obtain and sustain a conviction.” USAM 9-27.220. This directive is not absolute. Even a provable case may be declined in three situations: when prosecution would serve no substantial federal interest; when the person is subject to effective prosecution in another jurisdiction; or when there exists an adequate non-criminal alternative to prosecution. Id. Broken down further, the relevant considerations include: • The federal interest in intellectual property crimes. • Federal law enforcement priorities. • The nature and seriousness of the offense. • The deterrent effect of prosecution. • The individual’s culpability in connection with the offense. • The individual’s criminal history. • The individual’s willingness to cooperate in the investigation or prosecution of others. • The probable sentence and other consequences of conviction. • Whether the person is subject to prosecution in another jurisdiction. • The adequacy of alternative non-criminal remedies. • Special considerations for deciding whether to charge corporations. This chapter briefly discusses how some of these factors apply specifically to intellectual property crimes. As discussed in Chapter IV, there are additional requirements and factors that apply in the prosecution of economic espionage cases under 18 U.S.C. 377 § 1831. The Assistant Attorney General for the National Security Division must approve the filing of any charges under § 1831. USAM 9-2.400, 9-59.100. Additionally, USAM 9-59.110 provides that “[p]rosecutors are strongly urged to consult with the Computer Crime and Intellectual Property Section before initiating prosecutions under 18 U.S.C. § 1832.” In economic espionage and trade secret cases, USAM 9-59.100 highlights the following factors in determining whether to commence prosecution: a) the scope of the criminal activity, including evidence of involvement by a foreign government, foreign agent or foreign instrumentality; b) the degree of economic injury to the trade secret owner; c) the type of trade secret misappropriated; d) the effectiveness of available civil remedies; and e) the potential deterrent value of the prosecution. B. The Federal Interest in Intellectual Property Crimes In determining whether a particular prosecution would serve a substantial federal interest, the prosecutor should weigh all relevant factors. USAM 9-27.230. Several factors that have specific application to intellectual property crimes are discussed below. 1. Federal Law Enforcement Priorities “[F]rom time to time the Department establishes national investigative and prosecutorial priorities. These priorities are designed to focus Federal law enforcement efforts on those matters within the Federal jurisdiction that are most deserving of Federal attention and are most likely to be handled effectively at the Federal level.” USAM 9-27.230(B)(1) (comment). Because of the importance of intellectual property to the national economy and the scale of intellectual property theft, intellectual property crime continues to be a law enforcement priority. Intellectual property theft worldwide costs American companies billions per year. The Justice Department has therefore made the enforcement of intellectual property laws a high priority. Through its Intellectual Property Task Force, the Department has identified four categories of IP investigations and prosecutions that deserve special attention: offenses that involve (1) health and safety; (2) links to organized criminal networks; (3) large scale commercial counterfeiting and piracy, particularly occurring online; 378 Prosecuting Intellectual Property Crimes and (4) trade secret theft or economic espionage. See U.S. Dep’t of Justice, PRO IP Act Annual Report FY2011, at 16 (2011). To meet these and other priorities, the Department has trained a national network of specialized prosecutors designated “Computer Hacking and Intellectual Property” (CHIP) coordinators, at least one of whom is located in each of the nation’s ninety-four United States Attorneys’ Offices, with greater numbers in the twenty-five CHIP units located in districts that experience some of the highest concentrations of computer and intellectual property crimes. Under this program, there are more than 260 CHIP prosecutors around the country. At the national and international level, intellectual property prosecutions are coordinated by the Department’s Computer Crime and Intellectual Property Section (CCIPS) in Washington, D.C. Notably, and in part to support these efforts, the Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act of 2008 increased both the penalties for intellectual property offenses and the resources available to law enforcement for the investigation and prosecution of IP crimes. Among other things, the PRO-IP Act: (i) increased the maximum penalties for trademark counterfeiting violations resulting in serious bodily injury or death; (ii) made restitution and criminal forfeiture mandatory for virtually all intellectual property offenses; (iii) established a federal grant program to provide state and local law enforcement agencies with funds for intellectual property crime training, prevention, enforcement and prosecution; (iv) authorized and later appropriated funding for the assignment of 51 Federal Bureau of Investigation (“FBI”) special agents specifically to investigate intellectual property crimes as well as 15 additional CHIP positions; and (v) required the submission of annual reports to Congress from both the Attorney General and the Director of the FBI on their progress in implementing the objectives of the PRO-IP Act. Prioritizing Resources and Organization for Intellectual Property (PRO-IP) Act, Pub. L. No. 110-403, §§ 205, 206, 401, 402, 404, 122 Stat. 4256, 426164, 4271-72, 4274-4277 (2008). CCIPS can help evaluate whether a particular intellectual property crime poses a matter of federal priority. CCIPS can be reached at (202) 514-1026. 2. The Nature and Seriousness of the Offense As with other offenses, intellectual property crimes vary in their nature and seriousness. It is therefore essential to consider each case on its own facts. IX. Charging Decisions 379 The offense’s nature and seriousness are indicated by the usual factors, with special importance placed on threats to health or safety, see U.S.S.G. § 2B5.3(b)(5); the volume of infringement as measured by the amount of revenue and profit, see § 2B5.3(b)(1), cmt. n.2; the involvement of organized crime, see § 2B5.3 cmt. n.4(B); and whether substantial harm was done to the reputation of the rights holder, see id. cmt. n.4(A). Other considerations that are more particular to intellectual property offenses include the following: • Federal criminal prosecution is most appropriate in the most egregious cases. The criminal intellectual property statutes punish only a subset of the conduct that is punishable under civil intellectual property laws. Even then, the government must prove its case beyond a reasonable doubt, including a high state of mens rea. • Limited federal resources should not be diverted to prosecute an inconsequential case or a case in which the violation is only technical. Even some branches of civil intellectual property law recognize the maxim, “de minimis non curat lex.” • Federal prosecution is most appropriate when the questions of intellectual property law are most settled. However, federal prosecutors should not hesitate to apply settled intellectual property concepts in innovative ways to new schemes and new technology. • Victims have a broad range of civil remedies that include restitution, damages, punitive or quasi-punitive damages, injunctions, court costs, and attorneys’ fees. See Section D. of this Chapter. • The more strongly an intellectual property owner acts to protect its rights, the stronger the interest in prosecution. Id. • Many intellectual property offenses include multiple victims: not only the owners of the intellectual property that was infringed, but also customers who were defrauded. Both classes of victim deserve protection, and one class’s lack of interest in prosecution should not countermand prosecution when the other class’s interest is strong. • The sources or manufacturers of infringing goods and services are generally more worthy of prosecution than distributors. Cf. U.S.S.G. § 2B5.3(b)(3) (adjusting offense level for infringement offenses involving the manufacturing, uploading or smuggling of infringing items by 2 levels, with a minimum offense level of 12). 380 Prosecuting Intellectual Property Crimes • Counterfeit goods or services that endanger the public’s health or safety deserve the highest consideration for prosecution. See U.S. Dep’t of Justice, PRO IP Act Annual Report FY2011, at 16 (2011); cf. U.S.S.G. § 2B5.3(b)(5) (adjusting offense level for infringement offenses involving “conscious or reckless risk of death or serious bodily injury [or] possession of a dangerous weapon” by 2 levels, with a minimum offense level of 14). 3. The Deterrent Effect of Prosecution Some infringers are undeterred by civil liability. They treat civil remedies as a cost of doing business and continue their infringement after civil sanctions, albeit with different products or under a different corporate guise. Criminal prosecution can better deter a persistent violator from repeating his or her crime. Criminal prosecution may also further general deterrence. Individuals may commit intellectual property crimes not only because some are relatively easy to commit, such as copying music, but also because they do not fear prosecution. But one person’s relatively small-scale violations, if permitted to take place openly and notoriously, can lead others to believe that such conduct is tolerated. While some counterfeiting or piracy offenses may not result in provable direct loss to a victim, the widespread commission of such crimes can devastate the value of intellectual property rights in general. Criminal prosecution plays an important role in establishing the public’s understanding of what conduct is acceptable and what is not. Vigorous prosecution changes the public’s calculus. Put simply, more individuals will be deterred from committing intellectual property offenses if they believe they will be investigated and prosecuted. 4. The Individual’s History of Criminal Offenses and Civil Intellectual Property Violations Repeat criminal offenders are especially worthy of prosecution. See USAM 9-27.230(B)(5) (comment). The repeat-offender provisions in the intellectual property crime statutes, e.g., 18 U.S.C. § 2320(b)(1)(B), and the United States Sentencing Guidelines ensure that repeat offenders receive stiffer sentences. In addition to the defendant’s criminal history, it is also appropriate to consider his or her history of civil intellectual property violations. When infringers consider civil penalties merely a cost of doing business, criminal IX. Charging Decisions 381 enforcement is particularly appropriate. Sources for determining the defendant’s history of civil intellectual property offenses include civil litigation records (which are often searchable online), the victim’s legal department and private investigators, and any state consumer protection agencies to which consumers might have complained. Another relevant consideration concerns any infringement or misappropriation conduct following the issuance of cease and desist letters or injunctive orders. 5. The Individual’s Willingness to Cooperate in the Investigation or Prosecution of Others As discussed in Section B.2. of this Chapter, the sources of counterfeit or pirated goods or services are especially worthy of prosecution. Special consideration should be given to targets who are willing to cooperate in an investigation that leads to a source’s prosecution. This includes the prosecution of foreign sources. In recent years, the Department of Justice has worked extensively with foreign law enforcement agencies to investigate and prosecute foreign violators, both by extraditing foreign violators to the United States and by coordinating searches and prosecutions simultaneously in the United States and abroad. CCIPS has regular contact with foreign prosecutors and law enforcement agencies with an interest in intellectual property crime. Therefore, for assistance in investigating or prosecuting offenses with an international dimension, contact CCIPS at (202) 514-1026. C. Whether the Person Is Subject to Prosecution in Another Jurisdiction One situation in which a prosecutor may decline prosecution despite having a provable case occurs when the putative defendant is subject to effective prosecution in another jurisdiction. USAM 9-27.240. Relevant to this inquiry is the strength of the other jurisdiction’s interest in prosecution; the other jurisdiction’s ability and willingness to prosecute effectively; the probable sentence or other consequences of conviction in the other jurisdiction; and any other pertinent factors. Id. The primary question will often not be whether the case could be prosecuted by another U.S. Attorney’s Office, but rather whether it could be prosecuted by state, local, or foreign authorities. USAM 9-27.240(B) (comment). State, local, 382 Prosecuting Intellectual Property Crimes or foreign law enforcement may or may not be a viable alternative to federal prosecution. Federal intellectual property laws generally do not preempt state and local intellectual property laws. For example, in trade secret and economic espionage cases, Congress expressly anticipated that other appropriate remedies may be considered. The Economic Espionage Act explicitly provides that the statute does not “preempt or displace any other remedies, whether civil or criminal, provided by United States Federal, State, commonwealth, possession, or territory law for the misappropriation of a trade secret.” 18 U.S.C. § 1838. The only relevant area of intellectual property in which there is broad federal preemption is copyright infringement, but even in that area states have passed some creative laws that indirectly criminalize conduct involving some pirated works. Compare 17 U.S.C. § 301 (copyright preemption); R.W. Beck, Inc. v. E3 Consulting, LLC, 577 F.3d 1133, 1148-49 (10th Cir. 2009) (holding Copyright Act preempted state common law claims for unfair competition and unjust enrichment); Kodadek v. MTV Networks, Inc., 152 F.3d 1209, 121213 (9th Cir. 1998) (holding state law unfair competition claim preempted where complaint expressly based the claim on rights granted by the Copyright Act); Kregos v. Associated Press, 3 F.3d 656, 666 (2d Cir. 1993) (holding state law unfair competition and misappropriation claims preempted when based solely on the copying of protected expression in forms); Wnet v. Aereo, No. 12 Civ. 1543(AJN), 2012 WL 1850911, at *11 (S.D.N.Y. May 18, 2012) (holding state law unfair competition claim preempted by Copyright Act); People v. Williams, 920 N.E.2d 446, 458 (Ill. 2009) (holding Illinois antipiracy provision preempted by Copyright Act); and State v. Perry, 697 N.E.2d 624 (Ohio 1998) (holding that federal copyright law preempted prosecution in case involving defendant’s use of computer software on his bulletin board); with Anderson v. Nidorf, 26 F.3d 100, 102 (9th Cir. 1994) (holding California anti-piracy statute not preempted by federal copyright law in illegal sound recording case); Briggs v. State, 638 S.E.2d 292, 295 (Ga. 2006) (holding Georgia statute criminalizing the sale of recordings without a label identifying the “transferor” not preempted by federal copyright law); State v. Awawdeh, 864 P.2d 965, 968 (Wash. Ct. App. 1994) (holding Washington statute not preempted by federal copyright law in illegal sound recording case); and People v. Borriello, 588 N.Y.S.2d 991, 996 (N.Y. App. Div. 1992) (holding New York statute not preempted by Copyright Revision Act in illegal video recording case). IX. Charging Decisions 383 D. The Adequacy of Alternative Non-Criminal Remedies Department of Justice policy allows a prosecutor to decline criminal prosecution in a situation that could be adequately addressed by non-criminal remedies. USAM 9-27.220(A)(3). Almost every federal intellectual property crime has an analogue in civil law—be it state or federal—and those laws generally offer victims generous relief, such as injunctions, restitution, damages, punitive and quasi-punitive damages, court costs, attorneys’ fees, and even ex parte seizure of a defendant’s infringing products. See 15 U.S.C. §§ 1114, 1116-1117 (trademark); 17 U.S.C. §§ 501-505 (copyright). Imported and exported infringing merchandise can also be subject to administrative forfeiture and fines imposed by United States Customs and Border Protection. See, e.g., 17 U.S.C. §§ 602, 603(c) (copyright), 19 U.S.C. § 1526(e)-(f ) (trademark). The availability and adequacy of these remedies should be carefully considered when evaluating an intellectual property case. The prosecutor should also consider whether existing civil remedies have been or are likely to deter a particular defendant. For those undeterred by civil suits and remedies, criminal prosecution may be more appropriate. When the defendant has violated an earlier civil order, however, civil or criminal penalties for contempt of court may be an acceptable alternative to prosecution for criminal intellectual property violations. Finally, when the violator’s conduct is persistent, unsafe, profit-oriented, fraudulent, or physically invasive, civil remedies may not fully capture the wrongfulness of the defendant’s conduct. In such cases, criminal prosecution may be preferred. Although the government may prosecute even if the victim has not exhausted its civil and administrative remedies, the government should consider the victim’s pursuit of alternative remedies. The putative defendant’s conduct in response should also be examined. 384 Prosecuting Intellectual Property Crimes E. Special Considerations in Deciding Whether to Charge Corporations and Other Business Organizations Corporations and other business organizations are often used to commit intellectual property crimes. The decision whether to charge a business organization involves numerous considerations. Department of Justice policy on such charging decisions is generally set forth in the Principles of Federal Prosecution of Business Organizations. USAM 9-28.000. This guidance applies to intellectual property crimes in the same manner as to other crimes. In deciding whether prosecution of a business organization is appropriate, relevant factors include: • • • • • • • The nature and seriousness of the offense, including the risk of harm to the public, and applicable policies and priorities, if any, governing the prosecution of corporations for particular categories of crime (see USAM 9-28.400); The pervasiveness of wrongdoing within the corporation, including the complicity in, or the condoning of, the wrongdoing by corporate management (see USAM 9-28.500); The corporation’s history of similar misconduct, including prior criminal, civil, and regulatory enforcement actions against it (see USAM 9-28.600); The corporation’s timely and voluntary disclosure of wrongdoing and its willingness to cooperate in the investigation of its agents (see USAM 9-28.700); The existence and effectiveness of the corporation’s pre-existing compliance program (see USAM 9-28.800); The corporation’s remedial actions, including any efforts to implement an effective corporate compliance program or to improve an existing one, to replace responsible management, to discipline or terminate wrongdoers, to pay restitution, and to cooperate with the relevant government agencies (see USAM 9-28.900); Collateral consequences, including whether there is disproportionate harm to shareholders, pension holders, employees, and others not proven personally culpable, as well as impact on the public arising from the prosecution (see USAM 9-28.1000); IX. Charging Decisions 385 • • 386 The adequacy of the prosecution of individuals responsible for the corporation’s malfeasance (see USAM 9-28.300); and The adequacy of remedies such as civil or regulatory enforcement actions (see USAM 9-28.1100). Prosecuting Intellectual Property Crimes X. Victims of Intellectual Property Crimes— Ethics and Obligations But justice, though due to the accused, is due to the accuser also.... We are to keep the balance true. Justice Benjamin Cardozo, Snyder v. Massachusetts, 291 U.S. 97, 122 (1934). Many victims of intellectual property (“IP”) offenses are atypical, in that they often have substantial resources to protect their rights by investigating, pursuing, and deterring infringers independent of law enforcement. For instance, businesses often pool their resources in industry groups that undertake enforcement actions on their behalf. See Appendix G (listing trademark and copyright organization contacts). These groups sometimes investigate violations independently and refer the results to law enforcement with a request to bring charges. They may even seek to contribute resources to law enforcement agencies or multi-agency task forces organized to focus on IP offenses. Whether an IP victim can enforce its rights through civil or administrative processes may influence whether criminal prosecution is warranted (see Chapter IX of this Manual), and if so, what charges and strategy are appropriate. The fact that IP rights holders sometimes can address IP crime on their own does not, however, diminish their rights under federal law. Although rights holders are often the primary victims in IP offenses, consumers are victimized also. Consumers may be defrauded into buying counterfeits that are second-rate or, worse, unsafe, while consumers who purchase authentic goods end up paying higher prices to offset industry losses caused by counterfeiting and piracy. A. Victims’ Rights Beginning with the passage of the Victim and Witness Protection Act of 1982, Pub. L. No. 97-291, 96 Stat. 1248 (1982), Congress has enacted numerous statutes that protect victims’ rights during the investigation, prosecution, and 387 sentencing stages of criminal proceedings. Most recently, Congress revised and recodified victims’ rights laws in the Justice for All Act of 2004, Pub. L. No. 108-405, 118 Stat. 2260 (2004). The Department issued revised guidance for implementing the Justice for All Act in the Attorney General Guidelines for Victim and Witness Assistance (2012 ed.) (“AG Guidelines”), available at http:// www.justice.gov/olp/pdf/ag_guidelines2012.pdf. Generally, the Justice for All Act requires Department of Justice employees to make their best efforts to notify victims of the following rights: 1. The right to be reasonably protected from the accused 2. The right to reasonable, accurate, and timely notice of any public court proceeding, or any parole proceeding, involving the crime or any release or escape of the accused 3. The right not to be excluded from any such public court proceeding, unless the court, after receiving clear and convincing evidence, determines that testimony by the victim would be materially altered if the victim heard other testimony at that proceeding 4. The right to be reasonably heard at any public proceeding in the district court involving release, plea, sentencing, or any parole proceeding 5. The reasonable right to confer with the attorney for the government in the case 6. The right to full and timely restitution as provided in law 7. The right to legal proceedings free from unreasonable delay 8. The right to be treated with fairness and with respect for the victim’s dignity and privacy See 18 U.S.C. § 3771(a), (c)(1); AG Guidelines, arts. V.C-V.J. Apart from these enumerated rights, the prosecutor has an independent obligation under the Act to advise the victim of his or her right to counsel in connection with the rights established by the Act. See 18 U.S.C. § 3771(c)(2); AG Guidelines, art. V.B.2. The Act also creates several enforcement mechanisms. If the government or a victim believes the victim’s rights are being violated, relief is possible by way of motion in the trial court and ultimately a petition for writ of mandamus in the Court of Appeals. See 18 U.S.C. § 3771(d)(3); AG Guidelines, art. V.K. If the victim’s rights are violated, the Act does not permit a motion for a new trial, but does provide for re-opening a plea or sentence. 18 U.S.C. § 3771(d) 388 Prosecuting Intellectual Property Crimes (5). Finally, although the Act does not authorize suits against government personnel, it requires the Department to create an administrative authority within the Department to receive and investigate complaints, and impose disciplinary sanctions for willful or wanton non-compliance. See 18 U.S.C. § 3771(f )(2); AG Guidelines, art. V.B.4; 28 C.F.R. § 45.10 (2005). For purposes of enforcing these rights, the Justice for All Act defines a victim as “a person directly and proximately harmed as a result of the commission of a Federal offense or an offense in the District of Columbia.” See 18 U.S.C. § 3771(e) (emphasis added); see also AG Guidelines, art. III.C.1. A victim may be an individual, a corporation, company, association, firm, partnership, society, or joint stock company. See 1 U.S.C. § 1 (defining “person”); AG Guidelines, art. III.C.2. In considering whom to classify as a victim, prosecutors may consider whether those who were injured during the commission of a federal crime were indeed “directly and proximately harmed” by the offense within the meaning of 18 U.S.C. § 3771(e), particularly in cases where there are hundreds or even thousands of potential victims. The Act also contains a section on “Multiple Crime Victims” to address notification in cases involving large numbers of victims. This provision, which is of particular interest in cases involving the large-scale distribution of pirated or counterfeit goods, states: In a case where the court finds that the number of crime victims makes it impracticable to accord all of the crime victims the rights described in subsection (a), the court shall fashion a reasonable procedure to give effect to this chapter that does not unduly complicate or prolong the proceedings. 18 U.S.C. § 3771(d)(2); see also AG Guidelines, arts. III.K, V.D.2, V.E.4. For instance, in an online piracy prosecution with hundreds or thousands of victims from different content industries, it is often impractical for a prosecutor to notify every rights holder. In such cases, the prosecutor should consider, at a minimum, notifying and enlisting the assistance of any trade organizations that represent multiple victim rights holders. The prosecutor could then seek court approval for an alternative procedure authorizing him or her to notify such representatives in lieu of notifying all rights holders. The Act states that “[n]othing in this chapter shall be construed to impair the prosecutorial discretion of the Attorney General or any officer under his direction.” 18 U.S.C. § 3771(d)(6). Congress clearly did not intend the Act X.Victims of Intellectual Property Crimes 389 to be implemented in a way that hinders prosecutorial discretion in addressing issues of victims’ rights and notification. The Act did not alter other provisions that protect victimized rights holders. In all criminal prosecutions, a pre-sentence report must contain verified information containing an assessment of the impact on any individual against whom the offense has been committed. Fed. R. Crim. P. 32(d)(2)(B). Additionally, most intellectual property statutes guarantee victims (including producers and sellers of legitimate works, rights holders, and their legal representatives) the right to submit a victim impact statement identifying the extent and scope of their injury and loss prior to sentencing. See 18 U.S.C. §§ 2319(e), 2319A(d), 2319B(e), 2320(e). B. The Victim’s Role in the Criminal Prosecution The fact that victims of IP crime have access to civil remedies raises several issues during criminal prosecution. 1. Reporting an Intellectual Property Crime It is recommended that victims of intellectual property crimes document all investigative steps, preserve evidence, and contact law enforcement as soon as possible. Victims can report intellectual property crimes to appropriate law enforcement agencies as described in the referral guidelines contained in Appendix H of this Manual. 2. Ethical Concerns When the Criminal Prosecution Results in an Advantage in a Civil Matter Like other crime victims, IP rights holders are often interested in securing economic and other relief, but, unlike other types of crime victims, rights holders have strong civil enforcement tools and resources that they often use to aggressively pursue civil remedies. Prosecutors are obligated by statute and policy to assist victims in obtaining restitution and other remedies, but prosecutors are also obligated to serve the public interest. Occasionally, those interests may be in tension. In this regard, prosecutors should consider whether or to what extent IP victims are using the threat of criminal prosecution to advance their private interests and to what extent the government can offer a defendant concessions in prosecution or sentencing in exchange for the defendant’s agreement to compensate the victim or mitigate the harm the defendant has caused. 390 Prosecuting Intellectual Property Crimes a. Victims Who Seek Advantage by Threats of Criminal Prosecution It is commonplace for an IP-owner’s attorney to send a merchant a letter directing him to cease and desist sales of infringing merchandise. If the merchant continues to infringe, the letter will be solid evidence of the defendant’s mens rea during any ensuing criminal case. Sometimes the IP-owner’s letter will include an express or implied threat to seek criminal prosecution should the merchant persist. The extent to which it is ethically permissible for a lawyer to threaten to press criminal charges as a means to advance a civil cause of action is unclear. The lack of clarity stems in part from a patchwork of inconsistent ethical rules. The ABA’s Model Code of Professional Responsibility (adopted in 1969, amended in 1980) explicitly prohibited strategic threats of prosecution: “A lawyer shall not present, participate in presenting, or threaten to present criminal charges solely to obtain an advantage in a civil matter.” Model Code of Prof'l Responsibility DR 7-105A (1980). The ABA's Model Rules of Professional Conduct, adopted in 1983, omitted the rule as “redundant or overbroad or both.” See ABA Comm. on Ethics & Prof ’l Responsibility, Formal Ethics Op. 92-363 (1992) (allowing a lawyer to use a threat of a criminal referral to obtain advantage if the civil claim and criminal matter are related and well-founded). Not all states have dropped the old rule, and some have adopted other specific provisions addressing the issue. Compare Office of Disciplinary Counsel v. King, 617 N.E.2d 676, 677 (Ohio 1993) (disciplining a lawyer under the old rule for threatening to seek prosecution unless opponent in property dispute paid disputed rent or vacated the property), with Or. Rules of Prof ’l Conduct r. 3.4(g) (Or. State Bar 2005) (prohibiting such threats “unless the lawyer reasonably believes the charge to be true and if the purpose of the lawyer is to compel or induce the person threatened to take reasonable action to make good the wrong which is the subject of the charge”). Whatever the implication for the victim's lawyer, there is nothing unethical about the government's decision to prosecute the offender after such a threat has been made. The victim's threat does not present a legal or ethical obstacle for the prosecution. Instead, the concern for the government prosecutor is a strategic one, to the extent that the threat reflects on the victim's credibility or willingness to manipulate the criminal justice system for private gain. The victim's conduct in this regard is one factor among many to be considered in deciding whether to prosecute. X.Victims of Intellectual Property Crimes 391 b. Global Settlement Negotiations Ethical questions arise when the prosecution, victim, and defendant attempt to resolve all pending civil and criminal disputes in a global settlement agreement. While the answers to these questions are not entirely clear, there are some best practices that follow the guidelines cited above, Department policy, and strategic concerns. First, it is often the better practice for the prosecutor to defer to the other parties to suggest a global disposition rather than be the first to suggest it. By adopting this approach, the prosecutor is less likely to create the appearance of overreaching: [T]he government can neither be, nor seem to be, trading money for relief or insulation from criminal prosecution or sentencing consequences. Such a trade-off not only would undermine the integrity of the prosecutorial process, but also raises formidable fairness concerns, with wealthy defendants better able to reach global settlements than poor ones. *** Many prudent Assistant United States Attorneys consider global settlements to have an appropriate and ethical role in resolving parallel proceedings, but follow a rule of not introducing or suggesting such a disposition. If opposing counsel raise[s] the issue, it may be responded to and pursued by government attorneys in close consultation with supervisors, and mindful of the ethics issues. Office of Legal Education, U.S. Dep’t of Justice, Federal Grand Jury Practice § 12.12 (2008) (concerning parallel proceedings and global settlements). Second, it is the better practice to limit the negotiations to matters of criminal law. For example, as discussed in Section B.3.a. of this Chapter, although some civil remedies will award a victim of IP theft with treble damages, treble damages cannot be awarded under the criminal restitution statutes. See 18 U.S.C. § 3663(b), 3663A(b), 3664(f )(1)(A). See also Chapter VIII, Section D.3. of this Manual for a discussion of how to determine restitution measures). However, the criminal statutes permit restitution to be ordered “to the extent agreed to by the parties,” 18 U.S.C. § 3663(a)(3), and allow for the defendant to provide services in lieu of money, 18 U.S.C. §§ 3663(b)(5), 3664(f )(4) 392 Prosecuting Intellectual Property Crimes (C). Therefore, it is perfectly appropriate for the government to require full restitution as a condition of a plea agreement. See Chapter VIII, Sections D.1..2. of this Manual. Clearly, the government may not use the threat of unsupported charges to obtain advantage for a civil plaintiff. Model Rule of Professional Conduct 3.8 prohibits a prosecutor from seeking charges that the prosecutor knows are not supported by probable cause, and Rule 3.1 prohibits any advocate from asserting frivolous claims. Rule 4.1 requires a lawyer to be truthful. Even a well-founded threat of criminal prosecution may be unethical if intended merely to “embarrass, delay or burden a third person.” Model Rules of Prof ’l Conduct R. 4.4 (2003). Finally, there are strategic concerns. A judge or jury might react negatively if the victim or prosecutor appears to be threatening more serious consequences in the criminal case as leverage in the civil disposition. Although the prosecutor must at all times keep the victim informed of the progress of the criminal case, including discussion of a plea offer (see Section A. of this Chapter), it is ultimately the prosecutor who must decide how, if at all, to attempt to resolve a criminal case, including all issues of restitution to the victim. 3. Parallel Civil Suits The civil and regulatory laws of the United States frequently overlap with the criminal laws, creating the possibility of parallel civil and criminal proceedings, either successive or simultaneous. In the absence of substantial prejudice to the rights of the parties involved, such parallel proceedings are unobjectionable under our jurisprudence. Sec. & Exch. Comm’n v. Dresser Indus., Inc., 628 F.2d 1368, 1374 (D.C. Cir. 1980) (en banc) (footnote omitted). The topic of parallel civil suits is complex and largely beyond the scope of this Manual. For a more extensive discussion of parallel proceedings, see Office of Legal Education, U.S. Dep’t of Justice, Federal Grand Jury Practice § 12 (2008). The following is a brief summary. a. Private Civil Remedies Victims of IP crimes have significant civil enforcement mechanisms and remedies against infringers. In civil actions, IP rights holders can recover damages, the defendant’s profits, costs, attorney fees, and even statutory damages, which can be punitive or quasi-punitive. See 15 U.S.C. X.Victims of Intellectual Property Crimes 393 § 1117 (trademark infringement damages); 17 U.S.C. §§ 504 (copyright infringement), 505 (same), 1101 (bootlegged recordings of live musical performances), 1203 (DMCA); 18 U.S.C. § 2318(e) (illicit labels and counterfeit labels, documentation, and packaging for copyrighted works); see also Getty Petroleum Corp. v. Island Transp. Corp., 862 F.2d 10, 13-14 (2d Cir. 1988) (holding punitive damages unavailable for federal trademark claims, but may be available for state infringement and unfair competition claims). Civil remedies also include injunctive relief against future infringement and seizure or impoundment of infringing goods. 15 U.S.C. §§ 1116, 1118 (trademark); 17 U.S.C. §§ 502 (copyright), 503 (same), 1101 (bootlegged recordings of live musical performances), 1203(b) (DMCA); 18 U.S.C. § 2318(e)(2)(A), (B) (illicit labels and counterfeit labels, documentation, and packaging for copyrighted works); see also Chanel Inc. v. Gordashevsky, 558 F. Supp. 2d. 532, 539-40 (D.N.J. 2008) (granting permanent injunction preventing defendant from engaging in future infringing conduct and transfer of infringing domain names to plaintiff). Victims of trademark or copyright infringement can also seek the private counterpart of a search warrant: an ex parte seizure order, executed by law enforcement. 15 U.S.C. § 1116(d) (trademark); 17 U.S.C. § 503 (copyright); see Columbia Pictures Indus., Inc. v. Jasso, 927 F. Supp. 1075-77 (N.D. Ill. 1996) (sealed writ of seizure issued for pirated videos); Time Warner Entm’t Co. v. Does Nos. 1-2, 876 F. Supp. 407, 410-15 (E.D.N.Y. 1994) (recognizing availability of seizure order for infringing goods, but denying the victims’ ex parte request on Fourth Amendment grounds because it called for execution by private investigators and failed to describe the locations to be searched with particularity). A party seeking civil seizure of goods with counterfeit marks must first notify the United States Attorney to allow the government’s intervention should the seizure affect the public interest in a criminal prosecution. 15 U.S.C. § 1116(d)(2). Prosecutors should consider the availability and use of private civil remedies in deciding whether to prosecute an infringer criminally. See Chapter IX, Section D. of this Manual. b. Advantages and Disadvantages of Parallel Civil and Criminal Proceedings If the government prosecutes a defendant who is also a party to a pending civil case, the parallel proceedings raise their own set of issues: 394 Prosecuting Intellectual Property Crimes • • • • • • • • Advantages The victim’s private civil enforcement action brings additional statutory and equitable remedies to bear on a defendant. The victim’s allocation of resources to the investigation may conserve government resources. Moreover, as discussed in Section C. of this Chapter, the victim’s independent reasons for providing resources to advance the civil case may lessen the appearance of any potential conflict of interest. In the civil case, the plaintiff victim can compel discovery, which the prosecution can use and discuss with the victim without grand jury secrecy or operational concerns. A civil case presents the defendant with a difficult Fifth Amendment choice. If he submits to discovery, he may lock in his story, provide leads, disclose strategy, or furnish false exculpatory statements, all of which may assist the criminal prosecutor. If he asserts his privilege against self-incrimination in the civil matter, however, the jury in the civil case can be instructed that it may draw an adverse inference from his silence. See, e.g., Baxter v. Palmigiano, 425 U.S. 308, 318-19 (1976) (adverse inference from silence permissible in prison disciplinary proceedings); Hinojosa v. Butler, 547 F.3d 285, 291-95 (5th Cir. 2008); ePlus Tech., Inc. v. Aboud, 313 F.3d 166, 179 (4th Cir. 2002) (adverse inference permissible in civil RICO fraud case); LaSalle Bank Lake View v. Seguban, 54 F.3d 387, 390-91 (7th Cir. 1995) (same). A criminal conviction typically ends the civil case in the victim’s favor, either because the victim can rely on the criminal court’s restitution order, collateral estoppel conclusively establishes the defendant’s wrongdoing in the civil case, or the conviction simply renders the defendant less willing to contest the civil case. Disadvantages Given the availability of private, civil enforcement mechanisms, the court may view the criminal prosecution as a waste of judicial resources. The government loses control of a component of the investigation. Actions taken by private counsel and investigators for the civil case may not be in the criminal case’s best interests. If the grand jury is used to gather evidence, secrecy concerns may require criminal investigators to withhold material information from the parties to the civil proceeding, although collecting evidence outside X.Victims of Intellectual Property Crimes 395 • the grand jury, such as through search warrants or administrative subpoenas, may allow the government to share information without breaching grand jury secrecy. The defendant can compel discovery in the civil case, which may generate inconsistent witness statements and provide insight into the prosecution’s case. As a result, some prosecutors will seek to stay the civil case while the criminal case proceeds. c. Stays and Protective Orders to Delay Civil Proceedings During Criminal Prosecution If the disadvantages of parallel proceedings outweigh the advantages, the government may seek a protective order or a stay of the civil proceedings. There is ample authority for issuing a stay or protective order, especially when liberal civil discovery would allow a criminal target or defendant to interfere with the investigation or bypass restrictions on criminal discovery. See, e.g., Degen v. United States, 517 U.S. 820, 825-26 (1996) (holding that a stay may be sought in parallel civil forfeiture action); United States v. Stewart, 872 F.2d 957, 96163 (10th Cir. 1989) (holding that a court handling a criminal case may have authority under Fed. R. Crim. P. 16(d) or 18 U.S.C. § 1514(a) to prevent parties in a parallel civil case from abusing witnesses or discovery procedures); Sec. & Exch. Comm’n v. Dresser Indus., 628 F.2d 1368, 1376 n.20 (D.C. Cir. 1980) (en banc) (noting that the government may seek postponement of the noncriminal proceeding to prevent the criminal defendant from broadening his rights of criminal discovery against the government); Campbell v. Eastland, 307 F.2d 478, 490 (5th Cir. 1962) (holding that the public interest in criminal prosecution with limited discovery outweighed civil litigant’s right to prepare case promptly); see also Office of Legal Education, U.S. Dep’t of Justice, Federal Grand Jury Practice §§ 12.9,12.10 (2008). When seeking a stay or protective order, the government should be prepared to address the following factors: (1) the extent to which issues in the criminal case overlap with those presented in the civil case; (2) the status of the criminal matter, especially whether the civil defendant has been indicted; (3) the interest of the plaintiff in proceeding expeditiously, as weighed against the prejudice caused by the delay; (4) the private interests of and burden on the defendant; (5) the interest of the court in case management and judicial resources; (6) the interest of non-parties; and (7) the public interest. See, e.g., Louis Vuitton Malletier S.A. v. LY USA, Inc., 676 F.3d 83, 99-100 (2d Cir. 2012); Microfinancial, Inc. v. Premier Holidays Int’l, Inc., 385 F.3d 72, 78 (1st 396 Prosecuting Intellectual Property Crimes Cir. 2004); Keating v. Office of Thrift Supervision, 45 F.3d 322, 324-25 (9th Cir. 1995); Eastwood v. United States, No. 2:06-cv-164, 2008 U.S. Dist. LEXIS 106777, *9 (E.D. Tenn. Nov. 14, 2008); Chao v. Fleming, 498 F. Supp. 2d 1034, 1037 (W.D. Mich. 2007); Benevolence Int’l Found. v. Ashcroft, 200 F. Supp. 2d 935, 938 (N.D. Ill. 2002); Trustees of the Plumbers and Pipefitters Nat’l Pension Fund v. Transworld Mech., Inc., 886 F. Supp. 1134, 1139 (S.D.N.Y. 1995). C. Offers of Assistance From Victims and Related Parties IP rights holders frequently offer to provide resources to assist the government with criminal investigations. Traditionally, law enforcement agencies have routinely accepted assistance from victims and citizens willing to do so in discharge of their civic duty. However, offers of assistance in investigations and litigation have increased in scope, variety, and monetary value. Consequently, at the prompting of the Department of Justice’s Task Force on Intellectual Property, the Deputy Attorney General issued a May 2006 memorandum to all United States Attorneys and component heads on accepting resources from victims, related parties, and third parties for use in investigations and prosecutions. A copy of the memorandum, entitled Guidance for Acceptance of Assistance and Gifts from Private Parties for Use in Connection with Investigations and Litigation, may be found at http://www. justice.gov/dag/readingroom/dag-may262006.pdf. Although this subsection tracks the Department’s guidance closely and highlights certain issues, the reader is advised to refer to the memorandum itself before deciding on an appropriate response to an offer of resources. The reader should also refer to Appendix J of this Manual, which examines a variety of hypothetical offers of resources, such as private investigators offering information; victims offering meeting space, expert witnesses, purchase money to obtain counterfeit items, and storage space for seized items; and unrelated parties offering forensic tools and analysis, facilities from which to conduct an investigation, and expert witness services. An offer of donated resources generally raises three issues. First is whether the donation of resources is permitted by laws, regulations, and Department directives limiting the acceptance of gifts. This will usually turn on whether the offered resources constitute a gift or the type of assistance traditionally provided by victims of crime, their related parties, and third parties. Second, is whether X.Victims of Intellectual Property Crimes 397 the assistance is permitted by the rules of professional conduct regardless of whether the offered resources are considered to be gifts or assistance. And third, is whether the assistance will have an adverse impact on the prosecution, even if permissible under gift restrictions and rules of professional conduct. All three issues are addressed below. 1. Gift Issues a. Applicable Law The Attorney General has authority to “accept, hold, administer, and use gifts, devises, and bequests of any property or services for the purpose of aiding or facilitating the work of the Department of Justice.” 28 U.S.C. § 524(d)(1). Gifts of money (including money derived from property) must be deposited in the Treasury for the benefit of the Department and may be distributed by order of the Attorney General. 28 U.S.C. § 524(d)(2). In 1997, the Attorney General issued Department of Justice (“DOJ”) Order 2400.2, available at http://www.justice.gov/jmd/ethics/docs/doj-24002.htm, which “sets forth the Department's policies and procedures regarding the solicitation and acceptance of gifts, devises and bequests of property of all kinds.” The Order states that no Departmental employee may solicit a gift unless he or she has obtained the prior approval of the Attorney General or the Deputy Attorney General. DOJ Order 2400.2 ¶ 3.a.(1). Solicitations are rare and approved in only extraordinary circumstances. In addition, the Assistant Attorney General for Administration (AAG/A) has the exclusive authority to accept “gifts made to the Department” or any of the Department’s components. Id. ¶ 3.b.(1). Before accepting any gift, the AAG/A must consider whether: (1) the gift is appropriate for use; (2) the conditions the donor has placed on acceptance or use, if any, are “acceptable;” (3) any employee solicited the gift, and if so, whether approval was obtained; and (4) whether acceptance is “appropriate and advisable,” in light of conflictof-interest and ethics guidelines, including whether acceptance would “create the appearance of impropriety.” Id. ¶ 3.b.(2). The AAG/A has delegated to component heads the authority to determine whether to accept certain case-specific gifts from private parties in criminal and civil investigations, prosecutions, and civil litigation that have a value of $50,000 or less. The component head for U.S. Attorneys' Offices is the Director of the Executive Office for United States Attorneys. The component head may 398 Prosecuting Intellectual Property Crimes accept the first offer from a source up to $50,000. A second or subsequent offer in the same fiscal year from the same source must be submitted to the AAG/A for approval when the value combined with the first gift exceeds $50,000. Gifts that are not case-specific, gifts of cash, gifts valued above $50,000, and extraordinary case-specific gifts continue to require approval by the AAG/A. b. Distinction Between “Assistance” and “Gifts” Historically, the Department has distinguished a gift from traditional forms of assistance provided by citizens during a criminal or civil investigation, prosecution, or civil litigation. Matters that constitute “assistance” are not gifts and, accordingly, are not subject to the procedures applicable to gifts. If the offered resource constitutes assistance, it may be accepted without approval, but if it is a gift, it cannot be accepted without obtaining approval as described later in this Chapter. Law enforcement agencies routinely receive wide-ranging aid from private parties in the investigation and prosecution of federal crimes. Such aid has played an important and accepted role in the criminal process. See, e.g., Commonwealth v. Ellis, 708 N.E.2d 644, 651 (Mass. 1999) (“It is in the public interest that victims and others expend their time, efforts, and resources to aid public prosecutors.”); see also Wilson v. Layne, 526 U.S. 603, 611-12 (1999) (noting that the use of third parties during the execution of a warrant to identify stolen property “has long been approved by this Court and our common‑law tradition”). Victims and other private parties are often in a unique position to provide information and other aid in an investigation and litigation. Such private cooperation not only is desirable, but often is critical to law enforcement and the government's mission. In this vein, the vast majority of case-specific aid from private parties, particularly from victims and related parties, constitutes assistance and is not a gift. A victim provides assistance when it offers services, equipment, or logistical support that enhances the efficiency of the government’s efforts in relation to a case. Apart from cost savings, an offer of assistance enhances the Department’s efficiency when the offer gives an added benefit that is unique because of the victim or related party’s involvement. Assistance generally will be distinguishable in some way from what the Department could obtain through commercial obligations. For example, use of a victim company’s office space to conduct interviews of witnesses constitutes assistance since that location provides accessibility to staff that would not be possible in a hotel or other location. X.Victims of Intellectual Property Crimes 399 On the other hand, a victim company’s offer to Departmental employees of its fleet of cars for local transportation, even if made in the course of a case, provides only a convenience that is no different from what the Department would obtain on the commercial rental market, and should not be accepted. i. Assistance from Victims and Related Parties Aid provided by a victim will generally be classified as assistance, rather than a gift. Examples of actions that constitute assistance when provided by a victim include: • Providing factual or expert information in an investigation, or fact or expert testimony at trial • Turning over the fruits of an internal investigation (e.g., collecting and analyzing financial or transactional data) • Consulting with law enforcement during the investigation (e.g., reviewing seized evidence to distinguish legitimate copyrighted works from forgeries, identifying proprietary information in a trade secrets prosecution, or instructing professional staff and contractors to respond to queries from Departmental employees regarding technical subjects) • Permitting agents to use equipment, services, or logistical support in circumstances where such assistance provides a unique benefit not available on the commercial market, such as the use of office space for employee interviews, surveillance, or document review • Providing certain goods or services for use in the investigation or a related undercover operation (e.g., a bank providing credit card accounts in a credit card fraud investigation involving that bank) Aid provided by a party that is related to the victim (“related party”) will also generally constitute assistance. Related parties consist of those parties that have a close association with the victim and a shared interest with the victim in providing the particular assistance. Related parties can include a victim's immediate family, an industry association, or agents or contractors hired by the victim. For example, a computer security firm hired by a victim to monitor its computer network would be a related party in a case that involved the victim's computer network. In certain circumstances, an entity may be an “indirect victim” of a crime and also be in a unique position to offer assistance. For example, an owner of an apartment building would be an indirect victim of a tenant who used his rental apartment to sell and deliver controlled substances. In addition, a 400 Prosecuting Intellectual Property Crimes package delivery company that suspects use to transport and deliver illegal goods is also an indirect victim. Aid offered by an indirect victim generally will be considered assistance. For example, the landlord described above provides assistance with free use of an apartment for surveillance, as does the package delivery company when it provides its truck and uniform for an undercover agent to make a controlled delivery. However, depending on the value of the aid offered, and the potential appearance of impropriety that correlates to the value of the offer, an indirect victim's offer may cross the line from being permissible assistance to a gift that requires specific consideration before acceptance. For example, a landlord's offer of free use of an apartment for one year that has a market value of $25,000 in rent constitutes a gift. ii. Private Investigators Corporate victims and trade associations often retain private investigators to gather evidence to be used in a civil lawsuit or for referral to law enforcement authorities. Private investigators are in the class of “related parties” who may provide assistance to the Department. Intellectual property owners often outsource security and investigative responsibilities to other entities on an ongoing basis. In these cases especially, private investigators regularly turn up evidence of criminality and share it with law enforcement. Moreover, their investigative responsibilities do not end with the referral to authorities, as their clients expect them to continue to uncover evidence in related or separate matters, especially when the infringement or theft is committed by organized groups. Several principles should guide the acceptance of assistance from private investigators. First, prosecutors and agents should not direct or advise an entity or individual in its private investigation before a referral is made to law enforcement authorities. Apart from issues regarding the acceptance of gifts versus assistance, activity by a private investigator may be imputed to the government for Fourth Amendment, entrapment, or other purposes, depending on the extent to which government officials direct or control those activities. Second, prosecutors and agents may not relinquish control of investigative responsibilities to private investigators after the Department has initiated an investigation. Third, if the private investigator continues (postreferral) to investigate the case or related matters and turns up additional evidence or information, employees may accept the continued assistance, but should be careful to avoid the appearance of implicit approval or direction. In fact, attorneys and other employees should evaluate whether the parallel X.Victims of Intellectual Property Crimes 401 private investigation would interfere with the criminal matter and if so, whether the victim and private investigator should be asked to immediately cease any further investigation after the referral is made. There may, however, be instances when a private investigator is in a unique position to assist the Department. If the investigator’s assistance is within the scope of the work for which he was originally retained by the victim, the government may accept his assistance while he remains employed by the victim, and without payment from the Department. For example, if a private investigator has developed expertise in identifying the victim’s property, or genuine products, he may assist in examining materials to determine whether they have been stolen from the victim or are counterfeit. If a private investigator made controlled buys of counterfeit products from a suspect prior to referring the case to a federal agency, and the Department believes a federally supervised controlled transaction is warranted, the private investigator may continue to assist the Department at the victim’s expense if his involvement is needed to conduct the transaction and it is within the scope of the work for which he was originally retained. iii. Cash A direct contribution of money to the government to help fund the costs of law enforcement activities, either generally or in a particular case or cases, will almost always be a gift, not assistance. The private funding of federal law enforcement activities traditionally has not been considered assistance, and such direct funding raises serious ethical and other concerns, and would not be accepted by the Department. See, e.g., People v. Eubanks, 927 P.2d 310 (Cal. 1996) (victim paying cost of experts working for the district attorney’s office created an actual conflict of interest). But see Commonwealth v. Ellis, 708 N.E.2d 644 (Mass. 1999) (funding of prosecution costs by insurance association permitted because authorized by statute). To the extent cash is used for mission-related functions, the Department may not augment its resources in this manner. There is one exception to the principle that a direct contribution of money is an impermissible gift. When the government serves as a conduit for funds from the victim (or a related party) that are used for the purchase of the victim’s stolen property, the payment of ransom, or a similar demand, the government’s receipt of those funds does not constitute a gift. Accordingly, when an IP crime victim or a related party provides a Departmental employee funds to purchase 402 Prosecuting Intellectual Property Crimes the victim’s stolen property or pirated goods, the government is serving as a conduit for the funds and the funds are considered assistance. In these circumstances, the goods must be returned to the victim after completion of the government’s case. Similarly, the government serves as a conduit when it uses funds from a victim or a related party to pay ransom or extortion on behalf of the victim. The Department has an established practice of accepting funds in these circumstances. iv. Storage Costs in Counterfeit or Infringing Products Cases A company that owns intellectual property has a significant independent interest in keeping counterfeit or infringing goods out of the stream of commerce. If federal law enforcement has seized offending products, it is likely that the victim would seek to impound and destroy the offending articles even if prosecution were declined. See 15 U.S.C. §§ 1116(d)(1)(A), 1118 (allowing for court-authorized seizure and destruction of trademark-infringing articles at the rights holder’s request); 17 U.S.C. § 503 (allowing court to authorize impoundment and destruction of copyright-infringing articles and instrumentalities). When a victim has sought a court’s approval to seize and retain counterfeit or infringing products and chooses to do so, the Department may accept the offer of “assistance” to store offending articles that may also be relevant to the Department's investigation. There also may be instances when the victim will not choose to seek court approval of authority to retain and destroy illegal goods, yet offers the Department free storage at its facilities or elsewhere while the Department’s case is pending. It generally is permissible to accept such an offer. However, depending on the amount of time and space used for storage, the company’s offer to pay for storage may cross the line from being permissible assistance to an impermissible gift if the market value of the storage space is so exorbitant that continuing to accept free storage could raise a question of an appearance of impropriety. In such circumstances, a Department employee should consult with the assigned attorney and the employee or attorney’s Deputy Designated Agency Ethics Official (DDAEO) before continuing to accept the free use of storage space. v. Resources Donated for Ongoing Use by Law Enforcement Resources provided by a victim or related party will generally be considered to be a gift if their use is not restricted to the investigation(s) or prosecution(s) in which the provider is a victim or related party. For example, a package delivery X.Victims of Intellectual Property Crimes 403 company that gives the government free use of one of its delivery trucks for an undercover operation to investigate the hijacking of its trucks provides assistance. In contrast, the company’s offer to the government of free use of its trucks for any undercover operation, regardless of the subject matter of the investigation, constitutes a gift. Similarly, a computer company that provides computers for the government to use in investigating and prosecuting the theft of trade secrets from that company gives assistance. But if the company permits the government to use those computers for additional purposes unrelated to that case, either for continued use after its conclusion or for an unrelated matter, the computers become a gift. As a general rule, “assistance” is provided by a victim or related party for use in an investigation or litigation involving that person or entity. However, there may be limited circumstances in which a third party provides aid that is unique and not available on the open market in much the same way as a victim or related party’s assistance. For example, the DEA and FBI have longstanding, ongoing relationships with private package delivery companies that are akin to assistance. During an investigation, the DEA and FBI sometimes execute controlled deliveries of packages that contain illegal goods. Given safety, evidentiary, and other concerns, an agent will use the company’s truck and uniform rather than have the package delivery company and its employee perform this task. Of course, the delivery company uniforms and vehicles are not available on the open market. Yet their appearance is what is expected by the recipient, and it, therefore, provides the Department unique access to and identification of the intended recipient. The agent (in the package delivery uniform) may need to arrest the recipient of the package at the time of delivery. Given these unique and multiple factors, this type of aid is considered assistance. vi. Assistance from Private Third Parties The distinction between “assistance” and “gift” is also critical in cases involving resources donated by a private third party—that is, any person or entity that is neither a victim nor a related party. If the assistance provided by the third party is uniquely necessary to provide relevant information to the investigators, grand jury, judge, or jury, then it should generally be treated as assistance. If not, then it should generally be treated as a gift. In many cases this determination will be simple. The most fundamental and traditional types of aid that citizens have always provided in criminal investigations and prosecutions—such as answering agents’ and prosecutors’ 404 Prosecuting Intellectual Property Crimes questions, identifying suspects, and providing factual information and testimony—constitute assistance. This includes not only factual information gathered from individual citizens but also information that corporations and others provide from their records and databases. For example, an airline might provide information from passenger manifests, or a credit history service might provide credit information. Even though these activities may involve a cost to the third party in terms of time, effort, and expense and may provide a material benefit to the government, no one would suggest that such cooperation constitutes a gift; it is simply one of the responsibilities of citizenship. In dealing with assistance provided by third parties, it may be helpful to consider whether the assistance could be obtained by compulsory process. For example, if the information could be obtained by grand jury subpoena without cost, it should not be considered to be a gift merely because the cooperating third party elects to volunteer the required information rather than be compelled by legal process to produce it. The Department also may receive offers of free or reduced-fee consultation and testimony by experts or consultants. Individuals may be interested in sharing their expertise without a fee for a variety of reasons. Some experts or consultants may see the opportunity to testify on behalf of the United States, and be qualified as an expert, as a substantial benefit to their curriculum vitae or resume. In addition, an expert may charge an exorbitant market rate for his services to the general public that the Department cannot afford, and therefore, the expert may offer services for a reduced fee. The Department may accept free expert or consultative services under its gift acceptance authority, 28 U.S.C. § 524(d), or 5 U.S.C. § 3109. Both statutes provide separate mechanisms to accept these services. Neither statute, however, obviates the necessity for Departmental attorneys and staff to assess whether it is appropriate to accept the services for free. The same issues that govern the propriety of acceptance of items apply to the offer of consultative services and testimony. An attorney in consultation with an agent or other employee and the DDAEO must decide whether free expert services are appropriate to accept, and whether the government’s impartiality may or will be questioned in these circumstances. For additional examples of what constitutes traditional assistance or a gift, please refer to Appendix J, which examines a variety of hypothetical offers of resources. X.Victims of Intellectual Property Crimes 405 c. Departmental Procedures for the Solicitation and Acceptance of Gifts and Assistance i. Consultative Process for Acceptance of Assistance and Gifts A law enforcement officer or Department employee who receives any offer of assistance by a victim, related party, or witness beyond traditional assistance or access to company records should consult with the AUSA or Main Justice attorney who is assigned to the case or, if none, agency counsel, and the DDAEO who provides advice either to the law enforcement officer (or employee’s) component or the attorney’s office and component. The agent or employee in consultation with the appropriate counsel and DDAEO may determine that the offer is one of assistance (rather than a gift), and acceptance is appropriate. Disagreement among employees regarding these determinations should be submitted to the relevant component head(s) or designee and the Departmental Ethics Office, Justice Management Division (DEO) for resolution. Again, the component head for U.S. Attorneys’ Offices is the Director of the Executive Office for United States Attorneys. ii. Solicitation of Gifts No Department employee may solicit gifts or encourage the solicitation of gifts to the Department unless the solicitation has been approved in advance by the Attorney General or the Deputy Attorney General. Solicitations will rarely be appropriate and, accordingly, rarely approved. There may, however, be unusual circumstances in which it would be appropriate to solicit a gift to the Department in connection with a particular investigation, prosecution, or litigation. In that instance, the appropriate office first should consult with the DEO, and then present the matter to the Office of the Deputy Attorney General for a determination. iii. Acceptance of Gifts Any gift of goods or services accepted from a private party in connection with a criminal or civil investigation, prosecution, or litigation must be approved in accordance with procedures set forth below. Except in extraordinary circumstances, that approval must be obtained before the gift is accepted. If approval cannot be obtained before the gift is accepted, approval must be obtained no later than seven days after acceptance. 406 Prosecuting Intellectual Property Crimes • Certain gifts may be accepted only by the AAG/A. Only the AAG/A may approve acceptance of a gift of goods or services that is valued in excess of $50,000. If a component or office is uncertain whether a gift is valued in excess of $50,000, it may consult with the DEO regarding the reasonable value of the gift. If an office cannot determine adequately whether a gift exceeds $50,000 in value, approval must be obtained from the AAG/A. The AAG/A also must approve gifts of cash and gifts that are not casespecific, including gifts that will be used by the Department for purposes in addition to or after the conclusion of a particular investigation, prosecution, or litigation. • The AAG/A has delegated his authority to accept gifts from private parties for use by the Department in connection with a criminal or civil investigation, prosecution, or litigation. Component heads have been delegated authority to approve for their components the acceptance of a gift from a private party to be used in connection with a criminal or civil investigation, prosecution, or litigation that is (1) case-specific and (2) has a value of $50,000 or less. Component heads may further delegate this authority to one other individual at the Deputy Assistant Attorney General (or equivalent) level within his or her component. • Approval of acceptance must be coordinated among the relevant offices. If a law enforcement agent or other non-attorney employee receives an offer of a gift, that employee must notify and consult with an attorney, if any, who is assigned to the matter. The attorney, in conjunction with his or her component head, will determine whether to accept the offer. If no attorney has been assigned, the investigating component may decide whether to accept the offer of the gift. If an attorney from more than one office, Board, or Division is assigned a matter (e.g., an AUSA and attorney in the Criminal Division), both relevant component heads (or designees) must concur in the recommendation to accept a gift before it may be accepted. Disagreement among component heads may be resolved, upon request, by the AAG/A. Component heads must ensure that a Gift Donation Form and a Gift Acceptance Form are completed for each gift acceptance approved by their respective component. The completed forms must be forwarded to Property X.Victims of Intellectual Property Crimes 407 Management Services, Facilities and Administration Services Staff, Justice Management Division. Any questions regarding gift issues should be directed to the DEO. 2. Professional Responsibility Issues Several specific professional responsibility rules are implicated when the government accepts either assistance or gifts from outside parties. For ease of discussion, we refer here to the ABA Model Rules of Professional Conduct (available at http://www.americanbar.org/groups/professional_responsibility/ publications/model_rules_of_professional_conduct/model_rules_of_ professional_conduct_table_of_contents.html), but note that a different set of professional conduct rules may apply, depending on the circumstances of each case and the rules in the attorney’s state of licensure. First, a prosecutor represents the United States and has a duty of confidentiality to that client. Rule 1.6(a) requires a lawyer to protect confidential client information and prohibits disclosure of such information unless impliedly authorized, or the client consents, or some other enumerated exception applies. The prohibition applies to privileged information, “matters communicated in confidence by the client [and] also to all information relating to the representation, whatever its source.” Rule 1.6 cmt. [3]. When an investigator is hired or paid for by a victim to assist on a case and is working with government agents, the privately paid investigator might naturally expect to obtain information from the government in return for information he or she has disclosed to the government. However, a prosecutor must limit disclosures made about the case by him or herself and by the agents. See Rule 5.3(b), (c) (requiring lawyer to take reasonable steps to ensure that the conduct of nonlawyer assistants is compatible with the professional obligations of the lawyer and holding lawyer responsible for the noncompliance of non-lawyer assistants in some circumstances). Some disclosures may be impliedly authorized, while others would require the consent of the client; in most instances the United States Attorney or the Assistant Attorney General (or his or her designee) would provide the necessary consent for the United States. Of course, there are other limits on sharing of confidential grand jury information under Fed. R. Crim. P. 6(e). When a prosecutor plans to disclose confidential information to the persons providing assistance or gifts, the attorney should seek written agreement from the person that he or she will not use or disclose the information except in 408 Prosecuting Intellectual Property Crimes relation to the case without the express written consent of the appropriate official within the Department of Justice. Also, the prosecutor should consider whether sharing privileged information would waive the privilege. The rules may require that assistance by third parties be disclosed to the court and/or to the defense, either to ensure that all representations to the court are accurate and complete, Rule 3.3 (candor toward the tribunal), or to clarify when the assistance or gifts provided by a private party might be seen as affecting the credibility of an important government witness, Rule 3.8(d) (special responsibilities of a prosecutor). Moreover, there may be conflict of interest issues to resolve under Rule 1.7(a)(2), which recognizes that a lawyer may have a conflict of interest if “there is a significant risk that the representation of one or more clients will be materially limited by the lawyer's responsibilities to ... a third person or by a personal interest of the lawyer.” In these circumstances, a lawyer may nevertheless represent the client if the client gives informed written consent. The United States Attorney or the Assistant Attorney General (or his or her designee) would have the authority to provide consent to the attorney's work on a case notwithstanding the conflict. One could imagine a scenario in which a continuing relationship with a victim/witness who is providing assistance in one case might raise concerns about the lawyer's representation of the United States in that or another case, particularly one involving the victim/witness. Other professional conduct issues may arise because of assistance and gifts provided to the government. Each issue will require individual analysis, and questions may be directed to the Professional Responsibility Officer (PRO) in each office or to the Department's Professional Responsibility Advisory Office (PRAO). 3. Strategic and Case-Related Issues Even if the resources offered by the victim or related parties are acceptable under both gift laws and policies and the rules of professional responsibility, an attorney must still consider whether accepting the assistance will adversely affect the case. Just because it might be permissible to accept an offer of either assistance or a gift does not make it advisable to do so in all instances. Depending on the scope, nature, or value of the assistance or gift, the public may question the Department’s impartiality. Assistance that is extensive, unusual, or is, in fact or perception, of significant monetary value is more likely to raise questions X.Victims of Intellectual Property Crimes 409 about the Department’s impartiality and independence than assistance or a gift that is more discreet, of modest value, and routine. The government must exercise independent and impartial judgment in the conduct of all criminal and civil matters. See Young v. United States ex rel. Vuitton et Fils S.A., 481 U.S. 787, 803 (1987) (“The United States Attorney is the representative not of an ordinary party to a controversy, but of a sovereignty whose obligation to govern impartially is as compelling as its obligation to govern at all ....”) (quoting Berger v. United States, 295 U.S. 78, 88 (1935)). When working with victims and other private parties, a Departmental employee must be aware that an entangled or intimate relationship with a private party can negatively affect a matter and the standing or respect accorded the Department. For example, a highly-paid, aggressive private investigator could be portrayed as a bounty hunter willing to entrap a defendant. The government might be portrayed as a pawn of wealthy corporate interests. The defense might claim that the victim’s investigators were agents of the government and thereby seek to impute their conduct to the government for Fourth Amendment or entrapment purposes. The defense might seek to dismiss the case based on a claim of prosecutorial misconduct or conflict of interest. These questions or doubts can affect the Department’s ability to successfully prosecute or litigate a matter. An employee should consider, among other things, whether the offeror has an independent reason to offer the gift or assistance. Especially in parallel civil and criminal investigations, the fact that the victim would prefer to pay for expenses deemed important to the victim in pursuit of its civil claim tends to reduce the likelihood that a conflict of interest will be found. See Hambarian v. Superior Court, 44 P.3d 102, 109 (Cal. 2002) (finding no conflict presented by prosecution’s use of a victim-retained consultant hired by the victim to support an anticipated civil suit). An employee also should consider who the donor is. If the donor is an industry leader, the employee should avoid actions that appear to create a competitive advantage for that entity. If the donor is a trade association or combination of affected entities that is involved in ongoing monitoring or investigation to protect the industry as a whole, the offer may be considered more impartial. See Commonwealth v. Ellis, 708 N.E.2d 644, 649 (Mass. 1999) (explaining that likelihood of influence on a prosecutor’s charging decisions is reduced when the resources are devoted to investigating industry-wide offenses rather than for the benefit of one particular victim). 410 Prosecuting Intellectual Property Crimes The acceptance of donated resources is most problematic for courts when the resources are provided directly to the prosecutor or prosecutorial entity. See People v. Eubanks, 927 P.2d 310, 322-23 (Cal. 1997) (holding district attorney disqualified, and state attorney general substituted, after victim paid an invoice submitted to the prosecutor for expert services, among other expenses); cf. Young v. United States ex rel. Vuitton et Fils S.A., 481 U.S. at 809 (holding that private counsel representing the beneficiary of a court order cannot be appointed to prosecute the defendant for violating the order). The less direct the benefit to the prosecution, the less likely the defendant will be able to obtain relief. See Marshall v. Jerrico, Inc., 446 U.S. 238 (1980) (finding no realistic possibility that prospect of institutional benefit would unfairly influence decision to impose civil penalties by a Department of Labor administrator functioning as a prosecutor); Calderon v. Superior Court of California, No. C 97-1448 MJJ, 2001 WL 940904, at *7-8 (N.D. Cal. 2001) (finding victim’s contribution of resources to police investigation unlikely to influence prosecutor’s decisions). However, for the reasons discussed more fully herein, although a court may distinguish when aid is offered directly to a prosecutor or prosecutorial entity, as compared to an investigator or law enforcement agent, this distinction is not determinative for purposes of assessing whether the offer should be accepted in the first instance. In addition, the Department’s acceptance of a single, extraordinary gift from a victim or related party may impact the public, or more specifically, a jury’s, perception of the Department’s motivations and activities. If it appears that the Department’s actions are influenced heavily by a private party, the Department’s litigating posture and the public’s respect will be weakened. A jury may vote against the Department’s position because it perceives the Department is acting on behalf of a private party rather than as a representative of the United States’ interests. In extreme cases, a court may conclude that the Department’s acceptance of a gift created a conflict of interest and impaired the prosecutor’s independence. Cf. Eubanks, 927 P.2d at 322. Of course, the standard of appropriate behavior is not whether a matter will be dismissed, but whether the appearance of impropriety or the lack of independence outweighs the benefit of the proffered gift or assistance. The Department, by its actions, must maintain the public’s confidence in and respect for the criminal process, and the Department’s reputation for fairness generally. A Justice Department employee needs to balance the need for, or importance of, the aid against any negative perception by a jury or the public X.Victims of Intellectual Property Crimes 411 that can influence adversely a particular case. Employees should evaluate whether the assistance or gift is likely to call into question their independence and impartiality, or create an appearance of impropriety. This analysis does not lend itself to clear or measured parameters. The decision whether to accept assistance or a gift often can involve difficult and nuanced issues. Given the potential ramifications, these decisions should be made through the consultative process among law enforcement personnel, other investigators, and attorneys before the matter is resolved. The trial attorney is in the best position to assess these concerns, and he must be consulted before any employee may accept an offer of resources. The assigned attorney also should consult with an ethics officer to determine whether the offer constitutes assistance or a gift that may be accepted under the gift procedures, and the offer conforms with the rules of professional responsibility. 4. Help and Advice Each component (including each United States Attorney’s Office) has qualified specialists to provide guidance, including a DDAEO who can provide advice on gift and assistance issues. The General Counsel’s Office of the Executive Office for United States Attorneys provides guidance to U.S. Attorneys’ offices on matters of government ethics, including recusal, outside employment and conflicts of interest. The office number is (202) 252-1600. Department employees also may seek guidance from the Departmental Ethics Office, Justice Management Division. The office number is (202) 514-8196. For professional responsibility advice, an Assistant United States Attorney may first consult his or her supervisor and office Professional Responsibility Officer or seek advice from the Professional Responsibility Advisory Office (PRAO) at (202) 514-0458. 412 Prosecuting Intellectual Property Crimes Appendix A Commonly Charged Intellectual Property Crimes This overview provides the elements, defenses, penalties, and sentencing guideline sections concerning most of the intellectual property crimes and alternative charges discussed in this Manual, as well as an index indicating which section of the Manual that discusses each crime. Trafficking in Counterfeit Trademarks, Service Marks, or Certification Marks............................................................. 414 Criminal Copyright Infringement (Felony & Misdemeanor)......... 417 Unauthorized Recording of a Motion Picture (Camcording)......... 419 Trafficking in Illicit Labels or Counterfeit Labels, Documentation or Packaging for Copyrighted Works............. 421 Trafficking in Recordings of Live Musical Performances (Bootlegging).......................................................................... 422 Digital Millennium Copyright Act................................................ 423 Theft of Trade Secrets.................................................................... 425 Economic Espionage..................................................................... 427 Unauthorized Access of a Computer.............................................. 428 Interstate Transportation, Sale, or Receipt of Stolen Property........ 430 Mail and Wire Fraud..................................................................... 431 Prohibition on Devices to Intercept Communications................... 433 Unauthorized Reception of Cable Service...................................... 434 Trafficking in Satellite Decryption Devices.................................... 435 413 Trafficking in Counterfeit Trademarks, Service Marks, or Certification Marks 18 U.S.C. § 2320(a) Chapter III Elements 1. That the defendant trafficked, attempted to traffic, [or, for offenses committed on or after December 31, 2011, conspired to traffic], in [goods] [services] [labels, documentation, or packaging for goods or services] [on or after December 31, 2011, includes counterfeit military good or service the use, malfunction, or failure of which is likely to cause serious bodily injury or death, the disclosure of classified information, impairment of combat operations, or other significant harm to a combat operation, a member of the Armed Forces, or to national security] [on or after July 9, 2012, includes a “counterfeit drug,” as defined by 21 U.S.C. 321(g)] 2. That such trafficking, attempt to traffic, [or, on or after December 31, 2011, conspiracy to traffic] was intentional 3. That the defendant knowingly used a counterfeit mark on or in connection with the [goods] [services] [labels, documentation, or packaging for goods or services] in which the defendant trafficked, attempted to traffic, [or, on or after December 31, 2011, conspired to traffic] 4. That the use of the counterfeit mark was likely to cause confusion, to cause mistake, or to deceive Counterfeit mark: “[A] spurious mark--(i) that is used in connection with trafficking in any goods, services, labels, patches, stickers, wrappers, badges, emblems, medallions, charms, boxes, containers, cans, cases, hangtags, documentation, or packaging of any type or nature; (ii) that is identical with, or substantially indistinguishable from, a mark registered on the principal register in the United States Patent and Trademark Office and in use, whether or not the defendant knew such mark was so registered; (iii) that is applied to or used in connection 414 Prosecuting Intellectual Property Crimes with the goods or services for which the mark is registered with the United States Patent and Trademark Office, or is applied to or consists of a label, patch, sticker, wrapper, badge, emblem, medallion, charm, box, container, can, case, hangtag, documentation, or packaging of any type or nature that is designed, marketed, or otherwise intended to be used on or in connection with the goods or services for which the mark is registered in the United States Patent and Trademark Office; and (iv) the use of which is likely to cause confusion, to cause mistake, or to deceive; or ... a spurious designation that is identical with, or substantially indistinguishable from, a designation as to which the remedies of the Lanham Act are made available by reason of section 220506 of title 36.” Defenses Overrun goods: Had authorization but exceeded it (i.e., authorized to make 1,000 copies but made 5,000). Gray market goods: Goods legitimately manufactured and sold overseas and then imported into U.S. outside traditional distribution channels. Repackaging genuine goods: Genuine goods repackaged with genuine marks or reproduced marks, with no intent to deceive or confuse. Statutory maximum penalties First offense: 10 years’ imprisonment and fine of $2,000,000 or twice the gain/loss (individual); fine of $5,000,000 or twice the gain/loss (organization); for violations involving counterfeit military goods or services and counterfeit drugs, 20 years’ imprisonment and a fine of up to $5 million (individual) and $15 million (organization); enhanced penalties may also be available under § 2320(b)(2) if a defendant knowingly or recklessly causes or attempts to cause serious bodily harm or death by any of the offenses listed in § 2320(a) Subsequent offense: 20 years’ imprisonment and $5,000,000 fine or twice the gain/loss (individual); $15,000,000 fine or twice the gain/ loss (organization); for violations involving counterfeit military goods or services and counterfeit drugs, 30 years’ imprisonment and a fine of $15 million (individual) and $30 million (organization) Appendix A 415 Guideline section: United States Sentencing Guideline § 2B5.3 416 Prosecuting Intellectual Property Crimes Criminal Copyright Infringement (Felony & Misdemeanor) 17 U.S.C. § 506(a) & 18 U.S.C. § 2319 Chapter II Elements for prosecutions under subsections 506(a)(1)(A) and (a)(1)(B) 1. That the works that the defendant is alleged to have [reproduced] [distributed] were protected by copyright 2. That the defendant infringed the copyrights of the works by [reproducing] [distributing to the public] one or more copies of [each of ] the copyrighted works 3. That the defendant willfully infringed the copyrights [and] 4. That the defendant, during a 180-day period, reproduced or distributed ten (10) or more copies of one or more copyrighted works which have a total retail value of more than $2,500 [and] [5. [optional] That the act of infringement was for the purpose of commercial advantage or private financial gain] Elements for prosecutions under subsection 506(a)(1)(C) 1. That copyrights exist for the works that the defendant is alleged to have distributed 2. That the defendant infringed the copyrights of the works by distributing to the public one or more copies of [each of ] the copyrighted works 3. That the defendant willfully infringed the copyrights 4. That the works distributed by the defendant were being prepared for commercial distribution 5. That the defendant knew or should have known that the works were intended for commercial distribution [and] 6. That the defendant distributed the works by making them available on a computer network accessible to members of the public [and] [7. Optional: That the act of infringement was for the purpose of commercial advantage or private financial gain] Appendix A 417 Elements for Misdemeanor Copyright Infringement Elements 1, 2 & 3 are the same as the base felony elements except that any infringement of the copyright is covered, not just infringement by reproduction or distribution. 4. The defendant i®nfringed EITHER (a) for purposes of commercial advantage or private financial gain, (17 U.S.C. § 506(a)(1)(A) & 18 U.S.C. § 2319(b)(3)); OR (b) by reproduction or distribution of one or more copyrighted works with a total retail value of more than $1,000 within a 180-day period, (17 U.S.C. § 506(a)(1)(B) & 18 U.S.C. § 2319(c)(3)). Defenses First sale: The first purchaser and any subsequent purchaser of a specific lawfully made copy of a copyrighted work may sell, display (privately), or dispose of their copy, but may not reproduce and distribute additional copies made from that work. Fair use: Allows otherwise infringing use of a work for purposes such as (but not limited to) criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research. Archival exception for computer software: Owner of a copy of a computer program may copy the program as necessary to use the program or do machine maintenance or repair, and as an archival backup, subject to certain limitations. Statutory maximum penalties 17 U.S.C. § 506(a)(1)(A) First offense: 5 years’ imprisonment and fine of $250,000 or twice the gain/ loss (individual); fine of $500,000 or twice the gain/loss (organization) Subsequent offense: 10 years’ imprisonment and fine of $250,000 or twice the gain/loss (individual); fine of $500,000 or twice the gain/loss (organization) 17 U.S.C. § 506(a)(1)(B) First offense: 3 years’ imprisonment and fine of $250,000 or twice the gain/ loss (individual); fine of $500,000 or twice the gain/loss (organization) 418 Prosecuting Intellectual Property Crimes Subsequent offense: 6 years’ imprisonment and fine of $250,000 or twice the gain/loss (individual); fine of $500,000 or twice the gain/loss (organization) 17 U.S.C. § 506(a)(1)(C) First offense: Same as § 506(a)(1)(A) if purpose was for commercial advantage or private financial gain; if not, same as § 506(a)(1)(B) Misdemeanor: 1 year's imprisonment and fine of $100,000 or twice the gain/loss Guideline section: United States Sentencing Guideline § 2B5.3 Appendix A 419 Unauthorized Recording of a Motion Picture (Camcording) 18 U.S.C. § 2319B Chapter II, Section F. Elements 1. That the defendant used, or attempted to use, an audiovisual recording device to transmit or make a copy of a motion picture or other audiovisual work from a performance of such work in a motion picture facility, specifically [describe use or attempted use] 2. That such use, or attempted use of the device, was done knowingly 3. That such use, or attempted use of the device, was without the authorization of the copyright owner 4. That [describe motion picture or audiovisual work] is protected by copyright Statutory maximum penalties First offense: 3 years’ imprisonment and fine of $250,000 or twice the gain/ loss (individual); fine of $500,000 or twice the gain/loss (organization) Subsequent offense: 6 years’ imprisonment and fine of $250,000 or twice the gain/loss (individual); fine of $500,000 or twice the gain/loss (organization) Guideline section: United States Sentencing Guideline § 2B5.3 420 Prosecuting Intellectual Property Crimes Trafficking in Illicit Labels or Counterfeit Labels, Documentation or Packaging for Copyrighted Works 18 U.S.C. § 2318 Chapter VI Elements 1. That the defendant trafficked in [labels affixed to/enclosing/accompanying/ designed to be affixed to, to enclose, to accompany] [describe work/ documentation/ packaging;] [documentation/packaging] 2. That the [labels were counterfeit/illicit] [documentation/packaging was counterfeit] 3. That the defendant acted knowingly 4. Federal jurisdiction is satisfied because: the offense occurred in special maritime territories or other areas of special jurisdiction of the United States; the offense used or intended to use the mail or a facility of interstate or foreign commerce; the counterfeit or illicit labels were affixed to, enclosed, or accompanied copyrighted materials (or were designed to); or the documentation or packaging is copyrighted. Statutory maximum penalties 5 years’ imprisonment and fine of $250,000 or twice the gain/loss (individual); fine of $500,000 or twice the gain/loss (organization) Guideline section: United States Sentencing Guideline § 2B5.3 Appendix A 421 Trafficking in Recordings of Live Musical Performances (Bootlegging) 18 U.S.C. § 2319A Chapter II, Section F. Offense Whoever, without the consent of the performer or performers involved, knowingly and for purposes of commercial advantage or private financial gain— (1) fixes the sounds or sounds and images of a live musical performance in a copy or phonorecord, or reproduces copies or phonorecords of such a performance from an unauthorized fixation; (2) transmits or otherwise communicates to the public the sounds or sounds and images of a live musical performance; or (3) distributes or offers to distribute, sells or offers to sell, rents or offers to rent, or traffics in any copy or phonorecord fixed as described in paragraph (1), regardless of whether the fixations occurred in the United States. Statutory maximum penalties First offense: 5 years’ imprisonment and fine of $250,000 or twice the gain/loss (individual); fine of $500,000 or twice the gain/loss (organization) Second offense: 10 years’ imprisonment and fine of $250,000 or twice the gain/loss (individual); fine of $500,000 or twice the gain/ loss (organization) Guideline section: United States Sentencing Guideline § 2B5.3 422 Prosecuting Intellectual Property Crimes Digital Millennium Copyright Act (Anti-Circumvention and Anti-Trafficking) 17 U.S.C. §§ 1201(a)(1), 1201(b)(1), 1204(a) Chapter V Elements for Unauthorized Circumvention of Access Controls 1. The defendant acted willfully 2. The defendant circumvented a technological measure 3. The technological measure effectively controls access (i.e., access control) 4. The access control was to a copyrighted work 5. The act of circumvention was for the purpose of commercial advantage or private financial gain Elements for Trafficking in Access Control Circumvention Tools 1. The defendant acted willfully 2. The defendant manufactured, imported, offered to the public, provided, or otherwise trafficked in any technology, product, service, device, component, or part thereof 3. The technology, product, service, device, component, or part thereof either: (A) was primarily designed or produced for the purpose of, (B) has only limited commercially significant purpose or use other than, or (C) was marketed by that person or another acting in concert with that person with that person’s knowledge for use in, circumventing protection afforded by a technological measure 4. The defendant acted for commercial advantage or private financial gain Defenses Regulatory: The Librarian of Congress promulgates regulatory exemptions every three years that apply only to § 1201(a)(1)(A)'s prohibitions against circumventing access controls. Certain nonprofit entities: Nonprofit libraries, archives, educational institutions, or public broadcasting entities exempted from criminal prosecution in many cases. Appendix A 423 Information security: “[A]ny lawfully authorized investigative, protective, information security, or intelligence activity of an officer, agent, or employee” or contractor of the federal government or a state government is exempt from all three of § 1201's prohibitions for information security work on “government computer, computer system, or computer network.” Reverse engineering and interoperability of computer programs: Three reverse engineering or “interoperability” defenses for individuals using circumvention technology are provided by statute. These defenses are limited to computer programs. Encryption research: Activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works, if these activities are conducted to advance the state of knowledge in the field of encryption technology or to assist in the development of encryption products. Restricting minors' access to Internet: Courts may waive violations of subsections 1201(a)(1)(A) and 1201(a)(2) to allow parents to protect their children from inappropriate material available on the Internet, or to prohibit manufacturers from producing products designed to enable parents to protect their children. Protection of personally identifying information: Circumventing an access control to disable files that collect personally identifiable information. Security testing: No violation of § 1201(a)(1)(A) occurs if testing does not constitute copyright infringement or a violation of other applicable law such as the Computer Fraud and Abuse Act of 1986. Statutory maximum penalties First offense: 5 years’ imprisonment and fine of $500,000 or twice the gain/loss Second offense: 10 years’ imprisonment and $1,000,000 fine or twice the gain/loss Guideline section: United States Sentencing Guideline § 2B5.3 424 Prosecuting Intellectual Property Crimes Theft of Trade Secrets 18 U.S.C. § 1832 Chapter IV Elements 1. The defendant knowingly misappropriated information (e.g., possessed, stole, transmitted, downloaded) (or conspired or attempted to do so) 2. The defendant knew or believed this information was proprietary and that he had no claim to it 3. The information was in fact a trade secret (unless conspiracy or an attempt is charged) 4. The defendant intended to convert the trade secret to the economic benefit of anyone other than the owner 5. The defendant knew or intended that the offense would injure the owner of the trade secret 6. The trade secret was related to a product or service used or intended for use in interstate or foreign commerce Defenses Parallel development: Defendants discovered information underlying a trade secret through their own independent efforts. Reverse engineering: Defendants discovered information underlying a trade secret by taking a thing that incorporates the trade secret apart to determine how it works or how it was made or manufactured. Impossibility: Impossibility is no defense to charges of attempt or conspiracy. Advice of counsel: May negate mens rea. Claim of right—public domain and proprietary rights: Mens rea might be negated if defendant believed in good faith that he had a right to use the information, either because it was in the public domain or because it belonged to him. Trade secret: All forms and types of financial, business, scientific, technical, economic, or engineering information, if (A) the owner thereof has taken reasonable measures to keep such information secret; and (B) the information Appendix A 425 derives independent economic value, actual or potential, from not being generally known to, and not being readily ascertainable through proper means by, the public. Secrecy: Courts required to take any action necessary to protect the confidentiality of the trade secret during litigation. Statutory maximum penalties 10 years’ imprisonment and fine of $250,000 or twice the gain/loss (individual); $5,000,000 fine or twice the gain/loss (organization) Guideline section: United States Sentencing Guideline § 2B1.1 426 Prosecuting Intellectual Property Crimes Economic Espionage 18 U.S.C. § 1831 Chapter IV Elements 1. The defendant knowingly misappropriated information (e.g., possessed, stole, transmitted, downloaded) (or conspired or attempted to do so) 2. The defendant knew or believed this information was proprietary and that he had no claim to it 3. The information was in fact a trade secret (unless conspiracy or an attempt is charged) 4. The defendant knew or intended that the offense would benefit a foreign government, foreign instrumentality, or foreign agent Defenses: See Theft of Trade Secrets (18 U.S.C. § 1832) Pre-Indictment Approval Required Statutory maximum penalty 15 years’ imprisonment and fine of $5,000,000 or twice the gain/loss (individual); $10,000,000 fine or three times the value of the stolen trade secret, including expenses for research and design and other costs of reproducing the trade secret, or twice the gain/loss (organization) Guideline section: United States Sentencing Guideline § 2B1.1 Appendix A 427 Unauthorized Access of a Computer 18 U.S.C. § 1030(a)(2), (a)(4) Chapter IV, Section F. Offense under § 1030(a)(2)—Unlawfully accessing or attempting to access a computer to obtain information Whoever intentionally accesses [or attempts to access] a computer without authorization or exceeds authorized access, and thereby obtains— (A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.) (B) information from any department or agency of the United States OR (C) information from any protected computer Protected computer: a computer (i) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or (ii) which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States Enhancement pursuant to 18 U.S.C. § 1030(c)(2)(B) (i) the offense was committed for purposes of commercial advantage or private financial gain; (ii) the offense was committed in furtherance of any criminal or tortious act in violation of the Constitution or laws of the United States or of any State; or (iii) the value of the information obtained exceeds $5,000. 428 Prosecuting Intellectual Property Crimes Statutory maximum penalty 1 year’s imprisonment and fine of $100,000 Enhanced statutory maximum penalties 5 years’ imprisonment (second offense: 10 years’ imprisonment) and fine of $250,000 or twice the gain/loss (individual); fine of $500,000 or twice the gain/loss (organization) Guideline section: United States Sentencing Guideline § 2B1.1 Offense under § 1030(a)(4)—Unlawfully accessing or attempting to access a protected computer to further a fraud Whoever knowingly and with intent to defraud, accesses [or attempts to access] a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period. Statutory maximum penalties 5 years’ imprisonment and fine of $250,000 or twice the gain/loss (first offense), 10 years’ imprisonment and fine of $250,000 or twice the gain/ loss (second offense) Guideline section: United States Sentencing Guideline § 2B1.1 Appendix A 429 Interstate Transportation, Sale, or Receipt of Stolen Property 18 U.S.C. §§ 2314, 2315 Chapter II, Section F. & Chapter IV, Section F. Transportation offense under § 2314 Whoever transports, transmits, or transfers in interstate or foreign commerce any goods, wares, merchandise, securities or money, of the value of $5,000 or more, knowing the same to have been stolen, converted or taken by fraud; or Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transports or causes to be transported, or induces any person or persons to travel in, or to be transported in interstate or foreign commerce in the execution or concealment of a scheme or artifice to defraud that person or those persons of money or property having a value of $5,000 or more .... Sale or receipt offense under § 2315 Whoever receives, possesses, conceals, stores, barters, sells, or disposes of any goods, wares, or merchandise, securities, or money of the value of $5,000 or more, or pledges or accepts as security for a loan any goods, wares, or merchandise, or securities, of the value of $500 or more, which have crossed a State or United States boundary after being stolen, unlawfully converted, or taken, knowing the same to have been stolen, unlawfully converted, or taken .... Statutory maximum penalties 10 years’ imprisonment and fine of $250,000 ($500,000 for organizations) or twice the gain/loss Guideline section: United States Sentencing Guidelines §§ 2B1.1, 2B1.5 430 Prosecuting Intellectual Property Crimes Mail and Wire Fraud Statutes 18 U.S.C. §§ 1341, 1343, 1346 Section F. of Chapters II, III, IV, and VI Mail Fraud Offense Under § 1341 Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, or to sell, dispose of, loan, exchange, alter, give away, distribute, supply, or furnish or procure for unlawful use any counterfeit or spurious coin, obligation, security, or other article, or anything represented to be or intimated or held out to be such counterfeit or spurious article, for the purpose of executing such scheme or artifice or attempting so to do, places in any post office or authorized depository for mail matter, any matter or thing whatever to be sent or delivered by the Postal Service, or deposits or causes to be deposited any matter or thing whatever to be sent or delivered by any private or commercial interstate carrier, or takes or receives therefrom, any such matter or thing, or knowingly causes to be delivered by mail or such carrier according to the direction thereon, or at the place at which it is directed to be delivered by the person to whom it is addressed, any such matter or thing .... Wire Fraud Offense Under § 1343 Whoever, having devised or intending to devise any scheme or artifice to defraud, or for obtaining money or property by means of false or fraudulent pretenses, representations, or promises, transmits or causes to be transmitted by means of wire, radio, or television communication in interstate or foreign commerce, any writings, signs, signals, pictures, or sounds for the purpose of executing such scheme or artifice .... Theft of Honest Services Under § 1346 [T]he term “scheme or artifice to defraud” includes a scheme or artifice to deprive another of the intangible right of honest services. Statutory maximum penalties 20 years’ imprisonment and fine of $250,000 or twice the gain/loss (individual); fine of $500,000 or twice the gain/loss (organization) Appendix A 431 If affecting a financial institution or in relation to any benefit paid in connection with a presidentially declared major disaster or emergency: 30 years’ imprisonment and fine of $1,000,000 or twice the gain/loss Guideline section: United States Sentencing Guideline §§ 2B1.1, 2C1.1 432 Prosecuting Intellectual Property Crimes Prohibition on Devices to Intercept Communications 18 U.S.C. § 2512 Offense Any person who intentionally— (a) sends through the mail, or sends or carries in interstate or foreign commerce, any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications; or (b) manufactures, assembles, possesses, or sells any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications, and that such device or any component thereof has been or will be sent through the mail or transported in interstate or foreign commerce .... Statutory maximum penalties 5 years’ imprisonment and fine of $250,000 ($500,000 for organizations) or twice the gain/loss Guideline section: United States Sentencing Guideline § 2H3.2 Appendix A 433 Unauthorized Reception of Cable Service 47 U.S.C. § 553 Chapter II, Section F. Offense No person shall [willfully] intercept or receive or assist in intercepting or receiving any communications service offered over a cable system, unless specifically authorized to do so by a cable operator or as may otherwise be specifically authorized by law. Enhancement: Done for purposes of commercial advantage or private financial gain Statutory maximum penalties for willful violation 6 months’ imprisonment and fine of $1,000 Enhanced penalties 2 years’ imprisonment (5 years’ for subsequent offense) and fine of $50,000 ($100,000 for subsequent offense) Guideline section: United States Sentencing Guideline § 2B5.3 434 Prosecuting Intellectual Property Crimes Trafficking in Satellite Decryption Devices 47 U.S.C. § 605(e)(4) Chapter II, Section F. Offense Any person who manufactures, assembles, modifies, imports, exports, sells, or distributes any electronic, mechanical, or other device or equipment, knowing or having reason to know that the device or equipment is primarily of assistance in the unauthorized decryption of satellite cable programming, or direct‑to‑home satellite services .... Statutory maximum penalties 5 years’ imprisonment and fine of $500,000 or twice the gain/loss Guideline section: United States Sentencing Guideline §§ 2B5.3, 2H3.1 Appendix A 435 436 Prosecuting Intellectual Property Crimes Appendices B-F Sample Indictments and Jury Instructions Appendix B. Copyright Infringement http://dojnet.doj.gov/criminal/ccips/online/2319.htm Appendix C. Trademark Counterfeiting http://dojnet.doj.gov/criminal/ccips/online/2320.htm Appendix D. Theft of Trade Secrets and Economic Espionage http://dojnet.doj.gov/criminal/ccips/online/1831_1832.htm Appendix E. Digital Millennium Copyright Act http://dojnet.doj.gov/criminal/ccips/online/DMCA.htm Appendix F. Trafficking in Counterfeit or Illicit Labels and Counterfeit Documentation and Packaging http://dojnet.doj.gov/criminal/ccips/online/2318.htm 437 438 Prosecuting Intellectual Property Crimes Appendix G Intellectual Property Contact List 1. Federal Law Enforcement Contacts 2. Federal International Contacts 3. Trademark Organization Contacts 4. Copyright Organization Contracts 5. Other Organization Contacts 1. Federal Law Enforcement Contacts Computer Crime and Intellectual Property Section (CCIPS) Criminal Division, U.S. Department of Justice 1301 New York Avenue NW, Suite 600 Washington, DC 20530 Tel: 202-514-1026 Fax: 202-514-6113 http://www.cybercrime.gov Prosecution of, and guidance, support, resources, and materials for prosecuting domestic and international criminal IP offenses; development of IP enforcement policy; and support and oversight of the federal prosecution of IP crimes. National Intellectual Property Rights Coordination Center Homeland Security Investigations 2451 Crystal Drive, STOP 5105 Arlington, VA 20598 Tel: 866‑IPR-2060 Fax: 703-603-3872 Email: IPRcenter@dhs.gov http://www.iprcenter.gov 439 The IPR Center is a task force that brings together the key U.S. agencies involved in federal criminal enforcement of IPR laws. The IPR Center partners include: U.S. Immigration and Customs Enforcement’s Homeland Security Investigations, U.S. Customs and Border Protection; Federal Bureau of Investigation; Food and Drug Administration’s Office of Criminal Investigations; U.S. Postal Inspection Service; Defense Criminal Investigative Service; U.S. Patent and Trademark Office; and Nuclear Regulatory Commission. Federal Bureau of Investigation Intellectual Property Rights Center Unit Chief 2451 Crystal Drive Arlington, VA 22202 Tel: 703-603-3962 Fax: 703-603-3899 http://www.fbi.gov/about-us/investigate/white_collar/ipr/ipr Responsible for all IPR and Internet fraud investigations; support and oversight of the FBI’s IPR enforcement program. Department of Homeland Security (DHS) Customs and Border Protection (CBP) 1300 Pennsylvania Avenue NW Washington, DC 20229 http://www.cbp.gov • Office of International Trade—Trade Policy and Programs—IPR Policy and Programs Division Tel: 202-863-6091 Fax: 202-863-6520 Email: iprpolicyprograms@dhs.gov Coordinates with rights holders, members of the trade community, CBP offices, other federal agencies, and foreign governments, in developing and implementing IPR strategy, policy, and programs. 440 Prosecuting Intellectual Property Crimes • Office of International Trade—Regulations and Rulings—IPR and Restricted Merchandise Branch Tel: 202-325-0093 Tel: 202-325-0020 Fax: 202-325-0120 Email: hqiprbranch@dhs.gov Administers and advises on legal components and aspects of the agency’s IPR enforcement programs, issues rulings and infringement determinations, manages recordation system. • IPR E-Recordation (IPRR) Application Email: iprr.questions@dhs.gov https://apps.cbp.gov/e-recordations/ Online application for IP owners to record their trademarks and copyrights with CBP to protect against the importation of infringing products. Regulations and Rulings—IPR and Restricted Merchandise Branch, listed above, is the point of contact for any questions regarding recordation. • Office of Trade Relations Tel: 202-344-1440 Fax: 202-344-2064 Email: traderelations@dhs.gov http://www.cbp.gov/xp/cgov/toolbox/contacts/otr_contacts.xml Liaison between industry and CBP. Reviews concerns voiced by individuals or trade groups and furnishes recommendations to resolve justified complaints. U.S. Postal Inspection Service Mail Fraud Group 475 L’Enfant Plaza SW Washington, DC 20260 Tel: 202‑268‑4267 Tel: 1-877-876-2455 Fax: 202‑268‑7316 https://postalinspectors.uspis.gov Appendix G 441 Support and oversight of Postal Inspection Service’s mail fraud enforcement nationwide, including investigation of IP crimes committed by use of the mails. Food and Drug Administration (FDA) Office of Criminal Investigations 7500 Standish Place, Suite 250N Rockville, MD 20855 Tel: 240‑276‑9500 Fax: 240‑276‑8368 http://www.fda.gov/oci/ Conducts and coordinates criminal investigations of suspected violations of the Federal Food, Drug, and Cosmetic Act (FDCA), to include cases involving counterfeit, adulterated and misbranded FDA regulated products, as well as violations of the Federal Anti-Tampering Act (FATA); and other related Title 18 statutes. Consumer Product Safety Commission (CPSC) 4330 East West Highway Bethesda, MD 20814 Tel: 301-504-7923; 800-638-2772 Fax: 301-504-0124 http://www.cpsc.gov Has jurisdiction over approximately 15,000 types of consumer products, including coffee makers, electrical cords, toys, baby seats and cribs. Investigates leads into possible hazardous products; develops voluntary standards with industry, issues and enforces mandatory standards; and bans products if no feasible standard will adequately protect the public. Internet Crime Complaint Center (IC3) 1 Huntington Way Fairmont, WV 26554 Tel: 800-251-3221; 304-363-4312; complaint center: 800-251-7581 Fax: 304-363-9065 http://www.ic3.gov 442 Prosecuting Intellectual Property Crimes Partnership between National White Collar Crime Center (NW3C) and FBI. Allows victims to report fraud over the Internet; alerts authorities of suspected criminal or civil violations; offers law enforcement and regulatory agencies a central repository for complaints related to Internet fraud. 2. Federal International Contacts U.S. Department of Justice • International Coordinator in Each U.S. Attorney's Office Office of International Affairs, Department of Justice Tel.: 202-514-0000 • Computer Crime & Intellectual Property Section Tel.: 202-514-1026 • Office of International Affairs, Department of Justice Legal Attaché program Tel.: 202-514-0000 • Office of Overseas Prosecutorial Development & Training Resident Legal Advisor program Tel.: 202-514-1323 • Federal Bureau of Investigation Legal Attaché Program http://www.fbi.gov/contact/legat/legat.htm U.S. Trade Representative’s List of Nations that Fail to Provide Adequate IP Protection Annual Special 301 Report http://www.ustr.gov/trade-topics/intellectual-property 3. Trademark Organization Contacts United States Patent and Trademark Office (USPTO) Director of the USPTO P.O. Box 1450 Alexandria, VA 22313-1450 Tel.: 800-786-9199 Email: usptoinfo@uspto.gov http://www.uspto.gov/ Appendix G 443 The USPTO is the Federal agency for granting U.S. patents and registering trademarks. The USPTO advises the President of the United States, the Secretary of Commerce, and U.S. Government agencies on IP policy, protection, and enforcement; and promotes stronger and more effective IP protection around the world. To obtain a copy of a certified trademark registration: • Email: dsd@uspto.gov Fax: Public Records at 571-273-3250 Telephone number for information or inquiries: Tel: 571-272-3150 or 800-972-6382 International AntiCounterfeiting Coalition (IACC) Robert C. Barchiesi President 1730 M Street NW, Suite 1020 Washington, DC 20036 Tel.: 202-223-6667 Fax: 202-223-6668 Email: iacc@iacc.org http://www.iacc.org The touchstone of the IACC’s mission is to combat counterfeiting and piracy by promoting laws, regulations and directives designed to render the theft of IP undesirable and unprofitable. It is comprised of a cross section of business and industry - from autos, apparel, luxury goods and pharmaceuticals, to food, software and entertainment - affected by counterfeiting. International Trademark Association (INTA) Candice Li External Relations Manager, Anti-Counterfeiting 655 Third Avenue, 10th Floor New York, NY 10017-5617 Tel.: 212-642-1739 Fax: 212-768-7796 http://www.inta.org INTA is a global not-for-profit association of over 5,900 trademark owners, professionals, and academics dedicated to supporting trademarks and 444 Prosecuting Intellectual Property Crimes related IP in order to protect consumers and to promote fair and effective commerce. 4. Copyright Organization Contacts Library of Congress Copyright Office Certifications & Documents LM 402 101 Independence Avenue SE Washington, DC 20559 Tel.: 202-707-6787 http://www.loc.gov/ Retains files of registered copyrights and unpublished works; provides information on obtaining copies of copyright registrations. Association of American Publishers (AAP) M. Lui Simpson Executive Director International Copyright Enforcement and Trade Policy 455 Massachusetts Avenue NW, Suite 700 Washington, DC 20001 Tel.: 202-347-3375, ext. 541 Fax: 202-347-3690 http://www.publishers.org AAP is the national trade association of the U.S. book publishing industry. AAP’s more than 300 members include most of the major commercial publishers in the United States, as well as smaller and non-profit publishers, university presses and scholarly societies. AAP members publish hardcover and paperback books in every field, educational materials for the elementary, secondary, postsecondary, and professional markets, scholarly journals, computer software, and electronic products and services. Appendix G 445 Business Software Alliance (BSA) Jon Berroya Director, Global Internet Enforcement 20 F Street NW, Suite 800 Washington, DC 20001 Tel.: 202-872-5500 Fax: 202-872-5501 http://www.bsa.org BSA is a global association of software industry leaders, which runs a comprehensive set of programs to expand legal software markets in the world. BSA assists in identifying and locating victims, identifying and valuing infringing products; technical assistance with copyright protection technologies; assists in obtaining copyright registration certificates. Entertainment Software Association (ESA) 575 7th Street NW, Suite 300 Washington, DC 20004 Tel.: 202-223-2400 Fax: 202-223-2401 Email: esa@theESA.com http://www.theESA.com Represents companies that publish video and computer games for video consoles, personal computers and the Internet. Assists in identifying and locating victims, identifying and valuing infringing products; technical assistance with copyright and copyright protection technologies; assists in obtaining copyright registration certificates. The Independent Film & Television Alliance (IFTA) Susan Cleary Vice President & General Counsel 10850 Wilshire Boulevard, 9th Floor Los Angeles, CA 90024-4321 Tel.: 310-446-1000 Fax: 310-446-1600 http://www.ifta-online.org/ Represents the independent motion picture and television industry. 446 Prosecuting Intellectual Property Crimes International Federation of the Phonographic Industry (IFPI) Jeremy Banks Director, Anti-Piracy IFPI Secretariat 10 Piccadilly London W1J 0DD United Kingdom Tel.: 011-44-207-878-6804 Email: info@ifpi.org http://www.ifpi.org/ Represents the worldwide recording industry’s international organizations, legal strategies, litigation, and public relations. Coordinates international strategies in anti-piracy enforcement, technology, and lobbying of governments. IFPI and the Recording Industry Association of America (RIAA) work closely together. RIAA recommends contacting it before contacting the IFPI. International Intellectual Property Alliance (IIPA) 1818 N Street NW, 8th Floor Washington, DC 20036 Tel.: 202-355-7900 Fax: 202-355-7899 http://www.iipa.com IIPA is a private sector coalition of seven U.S. trade associations representing U.S. copyright-based industries in bilateral and multilateral efforts working to improve international protection and enforcement of copyrighted materials and open up foreign markets closed by piracy and other market access barriers. Motion Picture Association of America (MPAA) Michael Robinson EVP Content Protection Chief of Operations Motion Picture Association of America 15301 Ventura Boulevard, Building E Sherman Oaks, CA 91403 Appendix G 447 Tel.: 818-995-6600 Fax: 818-285-4403 http://www.mpaa.org Represents the film and entertainment industry. Assists in identifying and locating victims, identifying and valuing infringing products; technical assistance with copyright and copyright protection technologies; assists in obtaining copyright registration certificates. Recording Industry Association of America (RIAA) L. Carlos Linares, Jr., Esq. Vice President, Anti-Piracy Legal Affairs 1025 F Street NW, 10th Floor Washington, DC 20004 Tel.: 202-775-0101 Fax: 202-775-7253 http://www.riaa.org Represents the United States recording industry. Assists in identifying and locating victims, identifying and valuing infringing products; technical assistance with copyright and copyright protection technologies; assists in obtaining copyright registration certificates. Software & Information Industry Association (SIIA) 1090 Vermont Avenue NW, 6th Floor Washington, DC 20005-4095 Tel.: 202-289-7442 Fax: 202-289-7097 http://www.siia.net Keith Kupferschmid General Counsel and Senior Vice President, Intellectual Property Tel.: 202-789-4442 Email: keithk@siia.net SIIA represents software companies and publishers of magazines, books, newspapers, databases and other digital publications. SIIA’s mission is to protect, promote, and inform the software and content industry. Assists in identifying and locating victims, identifying and valuing infringing 448 Prosecuting Intellectual Property Crimes products; technical assistance with copyright and copyright protection technologies; assists in obtaining copyright registrations. 5. Other Organization Contacts Aerospace Industries Association (AIA) Kirsten Koepsel Director, Legal Affairs & Tax 1000 Wilson Boulevard, Suite 1700 Arlington, VA 22209 Tel: 703-358-1044 Fax: 703-358-1144 http://www.aia-aerospace.org Represents the aerospace, defense, and space industries. Assist members in working with governmental bodies to put rules in place regarding the protection of IP; assist in processes to seek relief and remedies; assist members in civil and criminal instances to ensure consistent responses to governmental bodies. Global Intellectual Property Center (GIPC) 1615 H Street, NW Washington, DC 20062 Tel: 202-463-5601 Fax: 202-463-3114 Email: gipc@uschamber.com http://www.theglobalipcenter.com Established in 2007 as an affiliate of the U.S. Chamber of Commerce, the GIPC works to raise awareness and increase support among key audiences for the value of strong IP rights, to promote and defend robust and effective IP rights and norms, and to strengthen the protection and enforcement of IP in the U.S. and abroad. Appendix G 449 Intellectual Property Owners Association (IPO) Herbert C. Wamsley Executive Director 1501 M Street, NW, Suite 1150 Washington, DC 20005 Email: info@ipo.org Tel.: 202-507-4500 Fax: 202-504-4501 http://www.ipo.org Established in 1972, IPO represents owners of patents, trademarks, copyrights and trade secrets. It is the only association in the U.S. that serves all IP owners in all industries and all fields of technology. IPO advocates effective and affordable IP ownership rights and concentrates on: supporting member interests relating to legislative and international issues; analyzing current IP issues; providing information and educational services; and disseminating information to the general public on the importance of IP rights. Motor & Equipment Manufacturers Association (MEMA) 1030 15th Street NW, Suite 500 East Washington, DC 20005 Tel: 202-393-6362 Fax: 202-737-3742 http://www.mema.org Catherine Boland Vice President, Legislative Affairs Tel.: 202-312-9241 Email: cboland@mema.org Dan Houton Director, Government Relations Tel: 202-312-9250 Email: dhouton@mema.rog Represents more than 1000 companies that manufacture motor vehicle components and systems. MEMA, in conjunction with its affiliate associations, created the Brand Protection Committee (BPC) to help 450 Prosecuting Intellectual Property Crimes address and set the association’s priorities in the areas of counterfeiting, diversion, non-compliant products and IP rights. National Association of Manufacturers (NAM) 733 10th Street NW, Suite 700 Washington, DC 20001 Tel: 202-637-3000 Fax: 202-637-3182 Email: manufacturing@nam.org http://www.nam.org Represents 11,000 manufacturing companies in every industrial sector and in all 50 states. Responsible for anti-counterfeiting and anti-piracy policy initiatives, and worldwide IP rights protection. Pharmaceutical Security Institute Thomas T. Kubic President and CEO 8100 Boone Blvd., Suite 220 Vienna, VA 22182 Tel.: 703-848-0160 Fax: 703-848-0164 Email: psi@psi-inc.org http://www.psi-inc.org/ Collects, analyzes, and disseminates information about the counterfeiting, illegal diversion and theft of pharmaceuticals in support of enforcement efforts worldwide. Its membership includes 25 pharmaceutical manufacturers from many nations. Appendix G 451 452 Prosecuting Intellectual Property Crimes Appendix H Checklist for Reporting an Intellectual Property Crime This checklist serves as a guide for the type of information that would be helpful for a victim or a victim’s authorized representative to include when reporting an intellectual property violation to law enforcement. Victims are encouraged to complete the checklist prior to making a report, if possible. Prosecutors and/or investigators may also use the checklist as a framework to gather information from victims. The checklist contains two sections: one intended for use in criminal copyright and trademark cases (including counterfeit trademarks, certification marks or service marks), and the other intended for use in criminal trade secret cases. They can be adapted for use in other intellectual property offenses as well. Criminal Copyright and Trademark Infringement Background / Contact Information Description of the Intellectual Property Description of the Intellectual Property Crime Origin and Entry (If Applicable) Possible Suspects Internet Involvement Civil Enforcement Proceedings Criminal Trade Secret Offenses Note on Confidentiality Background / Contact Information Description of the Trade Secret Measures Taken to Protect the Physical Trade Secret Location Confidentiality and Non-Disclosure Agreements Electronically-Stored Trade Secrets Document Controls Employee Controls Description of the Trade Secret’s Misappropriation Civil Enforcement Proceedings 453 Criminal Copyright and Trademark Infringement 1. Background and Contact Information Victim’s Name: Primary Address: Nature of Business: Primary Contact: Work Phone: Mobile Phone: Email: Fax: 2. Description of the Intellectual Property Describe the copyrighted material or trademark/service mark/ certification mark (e.g., title of copyrighted work, identity of logo), including any factors that make its infringement especially problematic (e.g., threats to public health and safety, pre-release piracy). Is the work or mark registered with the U.S. Copyright Office or on the principal register of the U.S. Patent and Trademark Office?1 ___ YES ___NO If yes, please provide the following: Registration Date: Registration Number: If no, state if and when you intend to register: Do you have a certified copy of the certificate of registration? ___ YES ___NO Registered trademarks can be found through the U.S. Patent & Trademark Office’s searchable database at: http://tess2.uspto.gov/bin/gate.exe?f=tess&state=4010:lmjahh.1.1 1 454 Prosecuting Intellectual Property Crimes Is the work or mark recorded with U.S. Customs and Border Protection (CBP)?2 ___ YES ___NO If yes, please provide the following: Recordation Date: Recordation Number: What is the approximate retail value of the infringed work, good, or service? Has the work or mark been the subject of a previous civil or criminal enforcement action? If so, please provide a general description as well as the case name, case number, and name of court. 3. Description of the Intellectual Property Crime Describe how the theft or counterfeiting was discovered. Do you have any examination reports of the infringing or counterfeit goods? ___YES ___NO If yes, please provide those reports to law enforcement. Please also provide a photograph or sample of the goods, if possible. Describe the type of infringement (e.g., manufacture, reproduction, import, export, distribution). Describe the scope of the infringing operation, including the following information: Estimated quantity of illegal distribution: Estimated value of illegal distribution: Estimated time period of illegal distribution: IP rights holders can apply online at https://apps.cbp.gov/e-recordations/ to record their trademarks and copyrights with CBP to protect against the importation of infringing products. 2 Appendix H 455 Is the illegal distribution national or international? Which states and/or countries? Identify where the infringement or counterfeiting occurred, and describe the location. 4. Origin and Entry (If Applicable) Identify the country of origin of the infringing item. Identify the date, location, and mode of entry into the United States. Identify the names of shippers and Harmonized Tariff Schedule designation and provide any other applicable shipping or customs information. 5. Possible Suspects Identify the name(s) or location(s) of possible suspects, including the following information: 456 Name (Suspect #1): Phone number: Email address: Physical address: Current employer, if known: Any other identifiers: Reason for suspicion: Name (Suspect #2): Phone number: Email address: Physical address: Current employer, if known: Any other identifiers: Reason for suspicion: Prosecuting Intellectual Property Crimes 6. Internet Involvement If the distribution of infringing or counterfeit goods involves the Internet, identify the following: How the Internet is involved (e.g., websites, FTP, mail, chat rooms): Relevant Internet address, including any affiliate websites (domain name, URL, IP address, email): Login or password for website: Operators of website, if known: Location of the servers and website host: Country where domain name is registered: Has the right holder sent a cease and desist notice to the website? ___YES ___NO If yes, please provide the following: Date of notice: Do you have a copy of the notice? ___ YES ___NO If you have conducted an internal investigation into the theft or counterfeiting activities, please describe any evidence acquired and submit, if possible, any investigative reports. 7. Civil Enforcement Proceedings Have you ever received counterfeit goods from the target listed above? ___YES ___NO If yes, did you place the target on notice that the goods received were counterfeit? Has a civil enforcement action been filed against the suspects identified above? ___YES ___NO If yes, identify the following: Name of court and case number: Date of filing: Appendix H 457 Names of attorneys: Status of case: If no, please state whether a civil action contemplated, what type and when. Please provide any information concerning the suspected crime not described above that you believe might assist law enforcement. 458 Prosecuting Intellectual Property Crimes Trade Secret Offenses NOTE ON CONFIDENTIALITY Federal law provides that courts “shall enter such orders and take such action as may be necessary and appropriate to preserve the confidentiality of trade secrets, consistent with the requirements of the Federal Rules of Criminal and Civil Procedure, the Federal Rules of Evidence, and all other applicable laws.” 18 U.S.C. § 1835. Prosecutors utilizing any of the information set forth below will generally request the court to enter an order to preserve the status of the information as a trade secret and prevent its unnecessary and harmful disclosure. 1. Background and Contact Information Victim’s Name: Primary Address: Nature of Business: Primary Contact: Work Phone: Mobile Phone: Email: Fax: 2. Description of the Trade Secret Generally describe the trade secret (e.g., source code, formula, technology, process, device). Provide an estimated value of the trade secret using one or more of the methods listed below: Appendix H 459 Estimated Value Method Cost to develop the trade secret Acquisition cost (include date / source of acquisition) Fair market value if sold Provide the name, title and contact information of the person most knowledgeable about the trade secret’s valuation: 3. Measures Taken to Protect the Physical Trade Secret Location Describe the company’s general security practices concerning entry to and moving within its premises, such as fencing the perimeter of the premises, visitor control systems, using alarming or self-locking doors or security personnel. Describe any security measures the company has employed to prevent unauthorized viewing or access to the trade secret, such as locked storage facilities or “Authorized Personnel Only” signs at access points. Describe any protocol the company employs to keep track of employees accessing trade secret material such as sign in/out procedures for access to and return of trade secret materials. Are employees ___YES ___ NO required to wear identification badges? Does the company have a written security policy? ___YES ___NO 460 Prosecuting Intellectual Property Crimes If yes, please provide the following information: Does the security policy address in any way protocols on handling trade secret information? ___YES ___NO How are employees advised of the security policy? Are employees required to sign a written acknowledgment of the security policy? ___YES ___NO The name, title, and contact information of the person most knowledgeable about matters relating to the security policy: How many employees have access to the trade secret? Was access to the trade secret limited to a “need to know” basis? ___YES ___NO If yes, describe how “need to know” was maintained in any ways not identified elsewhere (e.g., closed meetings, splitting tasks between employees and/or vendors to restrict knowledge, etc.): 4. Confidentiality and Non-Disclosure Agreements Does the company enter into confidentiality and non-disclosure agreements with employees and third parties concerning the trade secret? ___YES ___NO Has the company established and distributed written confidentiality policies to all employees? ___YES ___NO Does the company have a policy for advising company employees regarding the company’s trade secrets? ___YES ___NO 5. Electronically-Stored Trade Secrets If the trade secret is computer source code or other electronicallystored information, how is access regulated (e.g., are employees given unique user names, passwords, and electronic storage space, and was the information encrypted)? Appendix H 461 If the company stores the trade secret on a computer network, is the network protected by a firewall? ___YES ___NO Is remote access permitted into the computer network? ___YES ___NO If yes, is a virtual private network utilized? ___YES ___NO Is the trade secret maintained on a separate computer server? ___YES ___NO Does the company prohibit employees from using unauthorized computer programs or unapproved peripherals, such as high capacity portable storage devices? ___YES ___NO Does the company maintain electronic access records such as computer logs? ___YES ___NO 6. Document Controls If the trade secret consists of documents, were they clearly marked “CONFIDENTIAL” or “PROPRIETARY”? ___YES ___NO Describe the document control procedures employed by the company, such as limiting access and sign in/out policies. Was there a written policy concerning document control procedures? ___YES ___NO If yes, how were employees advised of it? Provide the name, title, and contact information of the person most knowledgeable about the document control procedures: 7. Employee Controls Are new employees subject to a background investigation? ___YES ___NO 462 Prosecuting Intellectual Property Crimes Does the company conduct regular training for employees concerning steps to safeguard trade secrets?___YES ___NO Does the company hold “exit interviews” to remind departing employees of their obligation not to disclose trade secrets? ___YES ___NO 8. Description of the Misappropriation of the Trade Secret Identify the name(s) or location(s) of possible suspects, including the following information: Name (Suspect #1): Phone number: Email address: Physical address: Current employer, if known: Any other identifiers: Reason for suspicion: Name (Suspect #2): Phone number: Email address: Physical address: Current employer, if known: Any other identifiers: Reason for suspicion: Describe how the misappropriation of the trade secret was discovered. Describe the type(s) of misappropriation (e.g., stealing, copying, drawing, photographing, downloading, uploading, altering, destroying, transmitting, receiving). Was the trade secret stolen to benefit a third party, such as a competitor or another business? ___YES ___NO Appendix H 463 If yes, identify that business and its location. Do you have any information that the trade secret was stolen to benefit a foreign government or instrumentality of a foreign government? ___YES ___NO If yes, identify the foreign government or instrumentality and describe that information. If the suspect is a current or former employee, describe all confidentiality and non-disclosure agreements in effect. Identify any physical locations associated with the misappropriated trade secret, such as where it may be currently stored or used. If you have conducted an internal investigation into the misappropriation, please describe any evidence acquired and provide any investigative reports that you can. 9. Civil Enforcement Proceedings Has a civil enforcement action been filed against the suspects identified above? ___YES ___NO If yes, please provide the following information: Name of court and case number: Date of filing: Names of attorneys: Status of case: If no, please state whether a civil action was contemplated, what type and when. Please provide any information concerning the suspected crime not described above that you believe might assist law enforcement. 464 Prosecuting Intellectual Property Crimes Appendix I Pre-PRO-IP Act Forfeiture Statutes for IP Offenses Criminal Copyright Infringement Administrative Infringing Items Facilitating Property Proceeds Civil Infringing Items Facilitating Property Proceeds Yes. • 17 U.S.C. § 509(b) (West 2007) (administrative forfeiture of infringing items forfeitable civilly). • 17 U.S.C. §§ 602-603 (West 2007) (forfeiture of prohibited1 imports of infringing items). • 19 U.S.C. § 1595a(c)(2)(C) (CBP forfeiture of imports of infringing2 items). Yes. • 17 U.S.C. § 509(b) (West 2007) (permitting administrative forfeiture of facilitating property forfeitable civilly). • 19 U.S.C. § 1595a(a) (CBP forfeiture of property facilitating importation of infringing items). Yes. • 18 U.S.C. § 981(d) (permitting administrative forfeiture of proceeds forfeitable civilly). Yes. • 17 U.S.C. § 509(a) (West 2007). • 17 U.S.C. §§ 602-603 (West 2007). Yes. • 17 U.S.C. § 509(a) (West 2007) (plates, molds, masters and other equipment used to make infringing copies). Yes. • 18 U.S.C. § 981(a)(1)(C). 465 Criminal Infringing Items Facilitating Property Proceeds Yes (mandatory). • 17 U.S.C. § 506(b) (West 2007) (mandating criminal forfeiture upon a criminal conviction). • 17 U.S.C. §§ 602-603 (West 2007). • 28 U.S.C. § 2461(c) (permitting criminal forfeiture of property forfeitable civilly). Yes (mandatory). • 17 U.S.C. § 506(b) (West 2007). • 28 U.S.C. § 2461(c). Yes. • 18 U.S.C. § 2461(c). Digital Millennium Copyright Act Administrative Civil Criminal No. No. No. Economic Espionage Act (Trade Secret Theft) Administrative Contraband Facilitating Property Proceeds Civil Contraband Facilitating Property Proceeds Criminal Contraband Facilitating Property Proceeds 466 No. No. No. No. No. No. No. Yes. • 18 U.S.C. § 1834(a)(2) (West 2007). Yes (mandatory). • 18 U.S.C. § 1834 (a)(1) (West 2007). Prosecuting Intellectual Property Crimes Counterfeit/Illicit Labels, Documentation, and Packaging for Copyrighted Works Administrative Counterfeit/Infringing Items Facilitating Property Proceeds Civil Counterfeit/Infringing Items Facilitating Property Proceeds Criminal Counterfeit/Infringing Items Facilitating Property Proceeds Appendix I Yes. • 17 U.S.C. § 509(b) (West 2007). • 19 U.S.C. § 1595a(c)(2)(C) (CBP forfeiture of imports of infringing3 items). Yes. • 17 U.S.C. § 509(b) (West 2007). • 19 U.S.C. § 1595a(a) (CBP forfeiture of property facilitating importation of infringing items). Yes. • 18 U.S.C. § 981(d) (permitting administrative forfeiture of proceeds forfeitable civilly). Yes. • 17 U.S.C. § 509(a) (West 2007). Yes. • 17 U.S.C. § 509(a) (West 2007). Yes. • 18 U.S.C. § 981(a)(1)(C). Yes (mandatory). • 18 U.S.C. § 2318(d) (West 2007) (mandating criminal forfeiture upon a criminal conviction). • 28 U.S.C. § 2461(c) (permitting criminal forfeiture of property forfeitable civilly). Yes (mandatory). • 17 U.S.C. § 2318(d) (West 2007). • 28 U.S.C. § 2461(c). Yes. • 18 U.S.C. § 981(a)(1)(C). • 28 U.S.C. § 2461(c). 467 Unauthorized Fixations of Live Musical Performances (“Bootlegging”) Administrative Unauthorized Recordings Facilitating Property Proceeds Civil Unauthorized Recordings Facilitating Property Proceeds Criminal Unauthorized Recordings Facilitating Property Proceeds 468 Yes. • 18 U.S.C. § 2319A(c). • 19 U.S.C. § 1595a(c)(2)(C) (CBP forfeiture of imports of infringing4 items). Yes. • 19 U.S.C. § 1595a(a) (CBP forfeiture of property facilitating importation of infringing items). Yes. • 18 U.S.C. § 981(d) (permitting administrative forfeiture of proceeds forfeitable civilly). Yes. • 18 U.S.C. § 2319A(c). No. Yes. • 18 U.S.C. § 981(a)(1)(C). Yes (mandatory). • 18 U.S.C. § 2319A(b) (West 2007) (mandating criminal forfeiture upon a criminal conviction). • 28 U.S.C. § 2461(c) (permitting criminal forfeiture of property forfeitable civilly). Yes (mandatory). • 18 U.S.C. § 2319A(b) (West 2007) (plates, molds, matrices, masters, tapes and film negatives – discretionary as to additional equipment). Yes. • 28 U.S.C. § 2461(c). Prosecuting Intellectual Property Crimes Unauthorized Recording of Motion Pictures (“Camcording”) Administrative Unauthorized Recordings Facilitating Property Proceeds Civil Unauthorized Recordings Facilitating Property Proceeds Criminal Unauthorized Recordings Facilitating Property Proceeds Appendix I Yes. • 19 U.S.C. § 1595a(c)(2)(C) (CBP forfeiture of imports of infringing5 items). Yes. • 19 U.S.C. § 1595a(a) (CBP forfeiture of property facilitating importation of infringing items). No. No. No. No. Yes (mandatory). • 18 U.S.C. § 2319B(b) (West 2007). Yes (mandatory). • 18 U.S.C. § 2319B(b) (West 2007). No. 469 Goods, Services, Labels, Documentation, and Packaging with Counterfeit Marks Administrative Counterfeit Items Facilitating Property Proceeds Civil Counterfeit Items Facilitating Property Proceeds 470 Yes. • 18 U.S.C. § 2320(b)(2) (West 2007) (for offenses committed from March 16, 2006 through October 12, 2008). • 19 U.S.C. § 1595a(c)(2)(C) (CBP forfeiture of imports of infringing6 items). Yes. • 18 U.S.C. § 2320(b)(2) (West 2007) (for offenses committed from March 16, 2006 through October 12, 2008). • 19 U.S.C. § 1595a(a) (CBP forfeiture of property facilitating importation of infringing items). Yes. • 18 U.S.C. § 981(d) (permitting administrative forfeiture of items forfeitable civilly). Yes (mandatory). • 18 U.S.C. § 2320(b)(1)(A), (C) (West 2007) (for offenses committed from March 16, 2006 through October 12, 2008). Yes. • 18 U.S.C. § 2320(b)(1)(B) (West 2007) (for offenses committed from March 16, 2006 through October 12, 2008). Yes. • 18 U.S.C. § 981(a)(1)(C). Prosecuting Intellectual Property Crimes Criminal Counterfeit Items Facilitating Property Proceeds Yes (mandatory for offenses committed on or after March 16, 2006). • 18 U.S.C. § 2320(b) (West 2005) (for offenses committed before March 16, 2006 – discretionary, and did not require a criminal conviction – the United States could obtain an order for the destruction of the items upon a preponderance of the evidence showing). • 18 U.S.C. § 2320(b)(3)(A)(iii) (West 2007) (for offenses committed from March 16, 2006 through October 12, 2008) (mandatory criminal forfeiture upon a criminal conviction). • 28 U.S.C. § 2461(c) (permitting criminal forfeiture of property forfeitable civilly). Yes (mandatory for offenses committed on or after March 16, 2006). • 18 U.S.C. § 2320(b)(3)(A)(ii) (West 2007) (for offenses committed from March 16, 2006 through October 12, 2008). • 28 U.S.C. § 2461(c). Yes (mandatory for offenses committed on or after March 16, 2006). • 18 U.S.C. § 2320(b)(3)(A)(i) (West 2007) (for offenses committed from March 16, 2006 through October 12, 2008). • 28 U.S.C. § 2461(c). (Footnotes) 1 17 U.S.C. § 602(a) provides that unauthorized importation is an infringement merely if the copies or phonorecords “have been acquired outside the United States,” even if they were lawfully manufactured abroad, and their importation may be enjoined by the rights holder, who enjoys the exclusive right to distribution within the United States. 17 U.S.C. § 602(b), however, provides that only piratical copies – those whose making “would have constituted an infringement of copyright if this title had been applicable” – are prohibited from importation and thus subject to administrative seizure and forfeiture under 17 U.S.C. § 603(c). 2 Like 17 U.S.C. § 603(c), 19 U.S.C. § 1595a(c)(2)(C) permits administrative seizure and forfeiture only of piratical copies – “merchandise or packaging in which copyright ... violations are involved (including, but not limited to, violations of ... section 506 of title 17, United States Code ...).” Appendix I 471 3 19 U.S.C. § 1595a(c)(2)(C) permits administrative seizure and forfeiture of “merchandise or packaging in which copyright ... violations are involved (including, but not limited to, violations of ... section 2318 ... of title 18, United States Code ...).” 4 The theory would be that 19 U.S.C. § 1595a(c)(2)(C) permits administrative seizure and forfeiture of “merchandise or packaging in which copyright ... violations are involved,” even though the statute does not cite specifically 18 U.S.C. § 2319A. 5 The theory would be that 19 U.S.C. § 1595a(c)(2)(C) permits administrative seizure and forfeiture of “merchandise or packaging in which copyright ... violations are involved,” even though the statute does not cite specifically 18 U.S.C. § 2319B. 6 19 U.S.C. § 1595a(c)(2)(C) permits administrative seizure and forfeiture of “merchandise or packaging in which ... trademark ... violations are involved (including, but not limited to, violations of ... 15 U.S.C. 1124, 1125, or 1127 ... or section ... 2320 of title 18, United States Code) ....”. 472 Prosecuting Intellectual Property Crimes Appendix J Examples of Traditional Assistance and Gifts to Law Enforcement The examples below of what constitutes traditional assistance to law enforcement or a gift are based on the examples included with a memorandum issued by Deputy Attorney General Paul J. McNulty entitled Guidance for Acceptance of Assistance and Gifts from Private Parties for Use in Connection with Investigations and Litigation (May 2006). These examples highlight certain factors to consider and addresses the consultative process that should be followed. Please note that not every factor that should be considered has been identified below for each scenario. The examples are provided to highlight certain elements, but do not reflect the entire analysis. 1. Scenario: The Department has received information from a private investigator who has an ongoing contract with a motion picture association to investigate pirated and counterfeit goods, including pirated movie DVDs. The investigator provides information regarding websites and points of contact for persons/entities that may have a connection to the counterfeit materials. Analysis: This information constitutes traditional assistance; no particular consultation is required before a Departmental employee may accept this information. Continuing Scenario: The Department has initiated its own investigation based on the initial information provided by the association’s private investigator. After the Department’s investigation has begun, and without any further communications or direction from an FBI agent or the Criminal Division attorney assigned to the matter, the private investigator uncovers another source that appears to be involved with the counterfeit materials. The investigator reports this new information to the FBI agent. 473 Analysis: This information also constitutes traditional assistance that the FBI agent and attorney may accept. The attorney and agent may need to consult with each other to determine whether the investigator’s efforts may interfere with the Department’s activities, and whether the investigator should be advised to alter his activities in some manner in order to avoid any interference. Neither the agent nor attorney should advise the investigator what types of evidence are desired for the Department’s investigation. 2. Scenario: A nationwide retail giant has its own security force and has spent considerable resources to set up its own forensics laboratory to fight shoplifting and other crimes against the company. The local FBI office is investigating a matter that has no connection to the retail company. The FBI office, however, believes that the equipment at the retail company’s laboratory is superior to the Department’s capabilities for enhancing photographs for identification. The FBI office solicits the retail giant for help, and the business readily agrees to provide forensic assistance without charge. The enhanced photograph allows the FBI to continue its investigation with greater efficiency. Analysis: Initially, the FBI must obtain prior approval from the Deputy Attorney General or the Attorney General before any representative may contact the retail company to seek its services. The free forensic services constitute a gift. Since the value of these services is less than $50,000, the agent and attorney must seek the component head’s approval in order to accept these services for free. In considering this offer, the component head must consider why the Department is seeking outside forensics aid. The Department may need a third party’s gift because the Department does not own or have at its disposal the same equipment. In addition, the time‑sensitive nature of the case might require immediate action, and the Department might not gain access to such equipment with the same speed as that offered as a gift. In this situation, with advance approval of the solicitation the Department may accept the gift. 3. Scenario: Consider the same facts set forth in Scenario #2, but assume that the retail giant informed the local FBI office that it had a forensics laboratory with equipment capable of performing a variety of functions, and that it was offering general access to its equipment and staff for 474 Prosecuting Intellectual Property Crimes investigative purposes any time that the Department determined the company’s resources would benefit the Department. Analysis: A retail giant’s standing offer to allow the Department to use its forensic facilities, whether for case‑specific matters or general investigative purposes, should be considered carefully. (Initially, this company’s offer does not trigger the same considerations set forth in No. 2, where the Department solicited the gift.). As noted above, there may be instances when private industry has forensic resources that are not available to the Department, and the immediacy of the situation may warrant the Department’s use of outside resources. However, the decision to use a third party’s services is distinct from the decision to accept such services free of cost. In deciding whether to accept the services for free, counsel should consider whether there are any pending matters in the Department in which the retail giant is a party or could be affected directly by a particular matter. One‑time gifts of free assistance may be permissible. However, it is particularly important that the Department carefully scrutinize a third party’s offer to use its services for free on multiple occasions or on a periodic basis for separate cases or matters (e.g., several times a year). The Department should be circumspect in accepting more than one gift from the same source within one fiscal year. Again, while the donor may have resources unavailable to the Department, the Department should consider paying for the services provided. Even if the full cost is difficult to assess, the Department and a third party can identify a reasonable value for the unique services provided. One reason for the Department’s disinclination to accept multiple offers from one source is that the costs of pursuing the Department’s mission must be fully identified and presented as part of its budget for Congress to accept or reject. Accepting free services that are critical to the Department’s performance of its mission on a frequent or regular basis masks the actual costs of its annual operations. Second, periodic or regular acceptance of free services from an entity can raise an appearance of a conflict of interest, particularly if any matter later arises involving that donor. Appendix J 475 The component head may accept the first offer from a source up to $50,000. A second or subsequent offer in the same fiscal year from the same source must be submitted to the Assistant Attorney General for Administration (AAG/A) for approval when the value combined with the first gift exceeds $50,000. 4. Scenario: A corporation’s products are being counterfeited and its computer network has been infiltrated. The corporation has hired a computer security firm to evaluate the extent of the computer breach and to recommend modifications to its system. The corporation has told Departmental attorneys and investigators that it may speak with its employees and the computer security firm’s personnel about the breach, and utilize their expertise as necessary. The corporation is paying for the computer security firm’s services throughout the Department’s investigation, including time spent meeting with Department employees. One computer firm employee has particular proficiency in computer programming, and he would be an expert witness in any litigation against the defendant to discuss the unauthorized access and damage to the corporation’s security and computer privacy. The victim corporation also has provided office space for Departmental employees to interview corporate staff and the computer firm employees. Analysis: The corporation is a victim. The computer firm is a ‘related party’ because it is retained by the corporation. Access to both companies' personnel during the investigation is traditional assistance that does not warrant any formal approval process. The corporate and security firm employees are in a unique position to provide useful information on behalf of their employer/contractor. The agent and attorney should consult with each other, and potentially with the Professional Responsibility Officer (PRO) and the Deputy Designated Agency Ethics Official (DDAEO), to determine the extent to which they will accept the corporation's offers. Using corporate space for interviews does not raise any particular concerns. The computer security expert who assessed the damage to the corporation has distinct advantages over another computer expert who was not involved in the assessment. Despite this favorable position, the trial attorney should determine whether the potential appearance of the corporation's self‑interest in paying for the expert witness' testimony does not outweigh the benefit of this expert's testimony before accepting the services. 476 Prosecuting Intellectual Property Crimes 5. Scenario: The DEA is investigating a suspect for selling and delivering drugs from his apartment. In order to enhance its surveillance and consistent with its investigative procedures, DEA wants to rent an apartment in the building where the suspect lives. DEA approaches the owner of the building and offers to pay market rent for an apartment. The owner has a vacant apartment in a desirable location to conduct surveillance in the building. The owner is supportive of the DEA’s efforts and offers the apartment to DEA for three months free of charge. The fair market value of the vacant apartment is $1,500/month. Analysis: The owner is an indirect victim since the suspect’s illegal activities have an adverse affect on the owner’s property. Offers of aid from an indirect victim generally constitute assistance, although the value of the offer may be such that it should be considered a gift. Given the short time frame (three months) and the value involved ($4,500), this offer constitutes assistance, and an agent in consultation with an attorney may decide to accept the offer. However, if the owner offered the DEA agent free use of the apartment for nine months and that amount of time (or longer) was necessary for a more complex investigation, the agent and attorney should seek approval to accept the offer as a gift. Given that the owner is taking the apartment off the market for an extended period of time, the offer is more substantial than before, and higher-level approval (by the component head for a gift) is warranted. There is no clear line defining when assistance becomes a gift because of the financial value or imposition involved. For offers that exceed three months, an attorney should consult with the DDAEO to determine whether the offer may be accepted as assistance, or considered a gift. 6. Scenario: The Criminal Division is investigating a highly technical computer crimes case. A university professor has conducted research in the narrow field at issue. A Criminal Division attorney contacted the professor for general background information on this issue, saying that the Department is willing to pay for his consultative services. The professor is willing to provide advice, assistance, and testimony in federal court for free. Although the professor has no prior experience as a witness, the attorney intends to proffer the professor as an expert. Appendix J 477 Analysis: The professor is a third party and he has offered the attorney a gift. Assuming that the number of hours to prepare and present testimony is limited, the value of the professor’s services will be below $50,000. Although the Department (and component’s budget) will always benefit from no‑cost expert services, it is not always appropriate to accept this type of offer. While the professor will benefit professionally from his ‘expert’ qualification, this intangible benefit does not necessarily mean the Department should avoid the costs of payment. The attorney should consult with the PRO and DDAEO to determine the appropriate course of action. 7. Scenario: The FBI is investigating the sale of counterfeit goods. The corporate maker of the true product has offered to give the FBI $1 million to purchase the counterfeit goods from an identified broker. The FBI, in consultation with the local United States Attorney’s Office, accepts the offer, and makes arrangements with the corporation to provide the $1 million. The counterfeit goods are purchased. The corporation arranged for the goods to be transported and stored in its warehouse pending its initiation of a civil proceeding. Analysis: Because the Department is serving as the conduit for cash to recover counterfeit materials, the Department may accept the victim’s offer of funds for this particular purpose. The agent should seek approval from the AUSA prior to accepting the victim’s funds. Because the cost of storage to the company at its own facilities is minimal, the Department may accept the company’s offer to store the goods at the victim’s expense. 8. Scenario: An industry leader in the computer field has developed a software program that can meld various databases and enhance search capabilities for the law enforcement community. The company has offered this program to the Department. While it is not available for sale to the public, the program (including the technical support to assist its operations) is valued over $800,000. Analysis: Given the high value, this offer must be submitted to the AAG/A for acceptance. Moreover, more concerns arise because this program would enhance the Department’s general capabilities, and not just be used for a specific case investigation. Again, there are appearance issues in accepting 478 Prosecuting Intellectual Property Crimes resources of such significant value from an entity that may be the subject of Department action in another arena. This type of offer also directly impacts the Department’s operations and mission. However, the company is also offering a capability that is unparalleled. Given the magnitude of this offer, high‑level attention to determine whether this offer may be accepted is warranted. Appendix J 479 480 Prosecuting Intellectual Property Crimes Index A ACCESS CONTROL See generally Chapters V.B., V.C. Key Concepts ... 234 Access Controls vs. Copy/Use Controls 235 Circumvention vs. Trafficking in Circumvention Tools 237 Differences Between the DMCA and Traditional Copyright Law 238 Decryption or Circumvention of Access Controls May Increase the Offense Level 329 ACCESSIBLE TO MEMBERS OF THE PUBLIC See generally Chapter 2 Pre-release Piracy Increases the Offense Level by 2 324 ACTUAL CONFUSION The Counterfeit Mark Must Be Identical …109 Likelihood of Confusion, Mistake, or Deception 117 ACTUAL DISSEMINATION Distribution 44 Distribution 52 ACTUAL LOSS Restitution 148 Use Greater of Actual or Intended Loss 332 ADMINISTRATIVE FORFEITURE Administrative Forfeiture Proceedings 361 Table of Forfeiture Provisions Arranged by Criminal IP Statute 362 Choosing a Forfeiture Procedure 368 The Adequacy of Alternative NonCriminal Remedies 384 AFFIRMATIVE DEFENSES Lanham Act Defenses 137 Statute of Limitations 139 AFFIXED See generally Chapter VI.B.3. Not Genuine or Authentic 105 Federal Jurisdiction 288 Sentencing Guidelines 293 Number of Infringing Items 314 AIDING OR ABETTING Special Rules for Rental, Lease, and Lending 68 Cyberlockers and Linking Sites 78 Other Charges to Consider 81 Goods and Services … 102 Use of the Counterfeit Mark “On or In Connection With” Goods or Services 114 Sentencing Guidelines 149 ARCHIVAL EXCEPTION Operation of the Doctrine 63 “Archival Exception” for Computer Software 74 ATTORNEYS’ FEES When Copyright Protection Begins and Ends 13 Choosing a Forfeiture Procedure 368 The Adequacy of Alternative NonCriminal Remedies 384 AUDIOVISUAL RECORDING DEVICE Other Charges to Consider 83 AUTHORIZED USE DEFENSE Authorized-Use Defense: Overrun Goods 130 Authorized-Use Defense: Gray Market Goods 133 ADVICE OF COUNSEL DEFENSE Advice of counsel 200 481 B BERNE CONVENTION IMPLEMENTATION ACT OF 1988 25 BOOTLEGGING Trafficking in recordings of live musical performances 81 Racketeer Influenced and Corrupt Organizations Act (RICO) 87 The Labels, Documentation, or Packaging Materials Are Counterfeit or Illicit 286 Offenses Involving Copyright 311 Restitution is Available—and Often Required—in Intellectual Property Prosecutions 346 Table of Forfeiture Provisions Arranged by Criminal IP Statute 365 BUSINESS ORGANIZATIONS Special Considerations in Deciding Whether to Charge Corporations and Other Business Organizations 385 C CABLE AND SATELLITE SERVICE Other Charges to Consider 85 Offenses Involving Copyright 311 CAMCORDING Other Charges to Consider 83 Offenses Involving Copyright 311 Manufacturing, Importing, or Uploading Infringing Items Increases the Offense Level by 2 325 Table of Forfeiture Provisions Arranged by Criminal IP Statute 366 Appendix I CASH 402 Gift Issues 399 Acceptance of Gifts 407 CERTIFICATION MARKS See generally Chapter III Offenses Involving Copyright 311 482 CHILDREN Infringement of at Least 10 Copies of 1 or More Copyrighted Works 47 Restricting Minors’ Access to the Internet 269 CHIP UNITS Why Is Intellectual Property Enforcement Important? 5 Federal Law Enforcement Priorities 379 CIRCUMVENTION See generally Chapter 5 Number of Infringing Items 314 Decryption or Circumvention of Access Controls May Increase the Offense Level 329 Identifying Victims Who Qualify for Restitution 348 COLLECTIVE MARKS Overview 89 COMMERCE CLAUSE See INTERSTATE AND FOREIGN COMMERCE COMMERCIAL ADVANTAGE See PURPOSES OF COMMERCIAL ADVANTAGE OR PRIVATE FINANCIAL GAIN COMMERCIAL ECONOMIC ESPIONAGE See ECONOMIC ESPIONAGE COMMERCIAL SPEECH Knowingly Marketed for Circumvention 258 COMPUTER HACKING AND INTELLECTUAL PROPERTY (CHIP) COORDINATORS see CHIP UNITS CONSCIOUS AVOIDANCE The Defendant Used the Counterfeit Mark “Knowingly” 121 The Defendant Acted “Knowingly” 284 Prosecuting Intellectual Property Crimes CONSPIRACY Distribution 47 Jurisdiction 62 Cyberlockers and Linking Sites 78 Other Charges to Consider 81 Overview 91 Units of Prosecution 143 Other Charges to Consider 151 Overview 158 “Information” 164 Attempts and Conspiracies, Including the Impossibility Defense 189 Electronic Copies of Labels, Documentation, or Packaging 291 Applicable Guideline is § 2B1.1, Except for Attempts and Conspiracies 331 Identifying Victims Who Qualify for Restitution 350 CONTRABAND Making and Obtaining Counterfeits vs. Possession with Intent to Traffic 100 The Defendant Trafficked 285 Property Subject to Forfeiture 360 Table of Forfeiture Provisions Arranged by Criminal IP Statute 362 Civil Forfeiture in Intellectual Property Matters 369 Criminal Forfeiture in IP Matters 372 Appendix I COOKIE FILES Protection of Personally Identifying Information 269 COPY CONTROLS See generally Chapter V Decryption or Circumvention of Access Controls May Increase the Offense Level 329 COPYRIGHT See generally Chapters II, V, VI Copyright 6 Distinguished from Trademark and Copyright Statutes 281 Offenses Involving Copyright 381 Other Charges to Consider 151 Index Disclosure Through the Patent and Copyright Processes 195 Other Charges to Consider 226 Overview of Patent 297 Offenses Involving Copyright 311 Restitution 343 Forfeiture 357 Whether the Person Is Subject to Prosecution in Another Jurisdiction 382 Private Civil Remedies 393 Appendix I COPYRIGHT ACT OF 1976 Federal Preemption 12 COPYRIGHT MANAGEMENT INFORMATION Falsifying, Altering, or Removing Copyright Management Information 262 COPYRIGHT TREATY DMCA’s Background and Purpose 233 COPYRIGHT PROTECTION SYSTEMS DMCA’s Background and Purpose 233 COPYRIGHTABILITY Copyrightability 18 Work Being Prepared for Commercial Distribution 55 COST OF REPAIRS Methods of Calculating Loss 332 COUNTERFEIT GOODS OR SERVICES See GOODS AND SERVICES COUNTERFEIT PHARMACEUTICALS See PHARMACEUTICALS COUNTERFEIT TRADEMARKS See TRADEMARKS COUNTERFEIT DOCUMENTATION AND PACKAGING See generally Chapter VI COUNTERFEIT LABELS See generally Chapters III, VI Offenses Involving Copyright 311 Property Subject to Forfeiture 360 Table of Forfeiture Provisions Arranged by Criminal IP Statute 364 483 Victims’ Ability to Forfeit Property 371 Appendix I COUNTERFEIT MARKS See generally Chapters III, VI Table of Forfeiture Provisions Arranged by Criminal IP Statute 367 Parallel Civil Suits 393 CRIMINAL FORFEITURE See FORFEITURE CUSTOMER LISTS Introduction 155 “Information” 164 Independent Economic Value 168 D DECALS Electronic Copies of Labels, Documentation, or Packaging 291 DECRYPTION Technological Measures That Effectively Control Access (“Access Control”) 245 Decryption or Circumvention of Access Controls May Increase the Offense Level 329 Appendix A DELIBERATE IGNORANCE The Defendant Used the Counterfeit Mark “Knowingly” 122 The Defendant Acted “Knowingly” 284 DEPOSITIONS The Information Was a Trade Secret 163 Interlocutory Appeals 209 Due Process and Prosecutorial Misconduct Considerations 217 Choosing a Forfeiture Procedure 368 DERIVATIVE WORKS Copyright 6 The Rights Protected by Copyright 14 Infringement of the Copyright 33 Fair Use 71 Access Controls vs. Copy/Use Controls 236 Constitutionality of the DMCA 272 484 DESTRUCTION The First Sale Doctrine 64 Storage Costs and Destruction 142 Forfeiture 293 Forfeiture 359 Storage Costs in Counterfeit or Infringing Products Cases 403 DIGITAL LOCKS Access Controls vs. Copy/Use Controls 235 DISCLOSURES TO THE GOVERNMENT Other Charges to Consider 224 DISTANCE LEARNING Other DMCA Sections That Do Not Concern Prosecutors 240 DONATED RESOURCES Offers of Assistance From Victims and Related Parties 397 DRUGS See FOOD AND DRUG ADMINISTRATION E E-BOOKS Reproduction 36 ECONOMIC ESPIONAGE See generally Chapter IV Offenses Involving the Economic Espionage Act (EEA) 331 Table of Forfeiture Provisions Arranged by Criminal IP Statute 364 Introduction 377 Whether the Person Is Subject to Prosecution in Another Jurisdiction 383 ELECTRONIC TRANSMISSION OF A GENUINE CERTIFICATE Electronic Copies of Labels, Documentation, or Packaging 291 EMOTIONAL HARM Upward Departure Considerations 341 Prosecuting Intellectual Property Crimes ENCRYPTION Introduction 155 Access Controls vs. Copy/Use Controls 236 Technological Measures That Effectively Control Access (“Access Control”) 246 Encryption Research 267 EPHEMERAL REPRODUCTIONS Other DMCA Sections That Do Not Concern Prosecutors 241 ETHICS See generally Chapter X EXPERT WITNESSES The Information Was a Trade Secret 163 Interlocutory Appeals 209 Offers of Assistance From Victims and Related Parties 397 Under This Title (“Copy Control”) 260 Reverse Engineering and Interoperability of Computer Programs 264 Vagueness 276 Fair Use 277 FALSE MARKING False Marking of Patent 299 FAMILY ENTERTAINMENT AND COPYRIGHT ACT OF 2005 Elements 17 “Preregistration” of Certain Types of Works 20 Retail Value for Pre-release Works 50 Distribution of a Work Being Prepared for Commercial Distribution 51 Other Charges to Consider 83 Offenses Involving Copyright 312 EXTRADITION Interbank Account Seizures of Foreign Bank Funds 375 FDA See FOOD AND DRUG ADMINISTRATION EXTRATERRITORIAL Jurisdiction 61 Overview 161 Extraterritorial 221 FEDERAL REGISTRATION See REGISTRATION F FAIR MARKET VALUE Methods of Calculating Loss 332 FAIR USE Legal Basis for Copyright and Related Laws 11 The Defendant Acted “Willfully” 26 Infringement of the Copyright 33 Additional Element for Enhanced Sentence: Purpose of Commercial Advantage or Private Financial Gain 56 Fair Use 69 Other Charges to Consider 84 Circumventing Access Controls 242 How Congress Intended the AntiCircumvention Prohibition to Apply 248 Technological Measure That Effectively Protects a Right of a Copyright Owner Index FEDERAL PREEMPTION See PREEMPTION FINANCIAL GAIN Elements 16 Additional Element for Enhanced Sentence: Purpose of Commercial Advantage or Private Financial Gain 55 Fair Use in Criminal Cases Statutory Penalties 80 Trafficked 98 Consideration vs. Commercial Advantage and Private Financial Gain 99 Key Concepts: Access Controls vs. Copy Controls, Circumvention vs. Trafficking 234 Circumventing Access Controls 241 Trafficking in Access Control Circumvention Tools and Services 253 Trafficking in Tools, Devices, and Services to Circumvent Copy Controls 259 Offenses Involving Copyright 311 Offense Not Committed ... 326 485 FIRST AMENDMENT Fair Use 69 The First Amendment 202 Void-for-Vagueness 203 Closing the Courtroom 213 Knowingly Marketed for Circumvention 258 The First Amendment 273 Fair Use 277 FIRST SALE DOCTRINE First Sale 47 The First Sale Doctrine 63 First Sale (Does Not Apply) 290 FIXED IN ANY TANGIBLE MEDIUM OF EXPRESSION See TANGIBLE MEDIUM FONT EMBEDDING BITS Technological Measures That Effectively Control Access (“Access Control”) 245 Technological Measure That Effectively Protects a Right ... 260 FOOD See MISBRANDED FOOD, DRUGS, AND COSMETICS FOOD AND DRUG ADMINISTRATION Other Charges to Consider 153 FOREIGN AGENT Overview 157 Elements Common to 18 U.S.C. §§ 1831, 1832 177 Additional 18 U.S.C. § 1831 Element: Intent to Benefit a Foreign Government, Foreign Instrumentality, or Foreign Agent 182 Introduction 377 FOREIGN COMMERCE See INTERSTATE AND FOREIGN COMMERCE FOREIGN ECONOMIC ESPIONAGE See ECONOMIC ESPIONAGE 486 FOREIGN GOVERNMENTS Trade Secrets 8 Overview 158 Elements Common to 18 U.S.C. §§ 1831, 1832 162 Additional 18 U.S.C. § 1831 Element: Intent to Benefit ...182 Economic Benefit to a Third Party 185 Department of Justice Oversight 222 Imprisonment and Fines 222 Intent to Benefit a Foreign Government, Instrumentality, or Agent 339 Intent to Transport or Transmit …339 FOREIGN INSTRUMENTALITY Overview 158 Intent to Transport or Transmit the Trade Secret out of the United States or to Benefit a Foreign Government, Instrumentality, or Agent 339 Introduction 378 FOREIGN VICTIMS Other Charges to Consider 151 FOREIGN WORKS Significance of Registration 21 FORFEITURE See generally Chapters VI.E.4., VIII Criminal Forfeiture 223 The Adequacy of Alternative NonCriminal Remedies 384 Appendix I G GENERIC LABELS The Labels, Documentation, or Packaging Materials Are Counterfeit or Illicit 287 GIFTS Distribution 39 Offers of Assistance From Victims and Related Parties 397 Gift Issues 398 Appendix J Prosecuting Intellectual Property Crimes GLOBAL SETTLEMENTS See PARALLEL PROCEEDINGS GOOD FAITH The Defendant Acted “Willfully” 26 Fair Use in Criminal Cases 72 The Defendant Used the Counterfeit Mark “Knowingly” 122 Lanham Act Defenses 137 Advice of Counsel 200 Claim of Right—Public Domain and Proprietary Rights 201 Due Process and Prosecutorial Misconduct Considerations 216 Encryption Research 267 Security Testing 270 GOODS AND SERVICES Overview 90 Goods and Services ... 101 The Counterfeit Mark Must Have Been Used for the Same Class of Goods or Services for Which the Genuine Mark Was Registered 115 Authorized-Use Defense: Overrun Goods 130 Offenses Involving Copyright 311 Offense Involving Counterfeit Military Goods and Services ... 328 The Nature and Seriousness of the Offense 380 GOVERNMENT TRADE SECRETS Other Charges to Consider 224 GRAY MARKET GOODS Authorized-Use Defense: Gray Market Goods 133 I IN PERSONAM Civil and Criminal Proceedings 361 Criminal Forfeiture in IP Matters 370 IN REM Civil and Criminal Proceedings 361 Criminal Forfeiture in IP Matters 370 Index IN USE The Trademark Counterfeiting Crime in General 96 The Defendant Used a “Counterfeit Mark”: Definition of a Counterfeit Mark 104 INAUTHENTIC Goods and Services … 103 Authorized-Use Defense: Overrun Goods 132 Retail Value 316 IGNORANCE OF THE LAW The Defendant Acted “Willfully” 26 ILLICIT LABELS See generally Chapter VI Distinguished from Trademark and Copyright Statutes 281 Offenses Involving Copyright 311 Table of Forfeiture Provisions Arranged by Criminal IP Statute 364 Victims’ Ability to Forfeit Property 371 Appendix I INDEPENDENT ECONOMIC VALUE Elements Common to 18 U.S.C. §§ 1831, 1832 162 INDICTMENTS See Appendices B-F INFORMATION SECURITY Information Security Exemption 264 INJUNCTIONS The Nature and Seriousness of the Offense 379 The Adequacy of Alternative NonCriminal Remedies 384 INNOCENT OWNER DEFENSE Innocent Owner Defense 369 INTELLECTUAL PROPERTY CLAUSE Constitutionality of the DMCA 270 INTENT TO DECEIVE Likelihood of Confusion, Mistake, or Deception 118 Repackaging Genuine Goods 136 487 False Marking of Patent 303 Identifying Victims Who Qualify for Restitution 352 INTERLOCUTORY APPEAL Overview 206 Interlocutory Appeals 207 INTERNAL INVESTIGATIONS Determining a Restitution Figure 356 INTERNET PIRACY Retail Value for Pre-release Works 49 Distribution of a Work Being Prepared for Commercial Distribution … 51 Additional Element for Enhanced Sentence: ... 56 Emerging and Special Issues 76 INTEROPERABILITY Reverse Engineering and Interoperability of Computer Programs 264 INTERSTATE OR FOREIGN COMMERCE Other Charges to Consider 86 Introduction 155 Overview 159 Product or Service Used or Intended for Use in Interstate or Foreign Commerce 186 Void-for-Vagueness 203 Other Charges to Consider 224 Constitutionality of the DMCA 270 Elements 282 Federal Jurisdiction 288 Venue 290 INTERSTATE TRANSPORTATION Other Charges to Consider 81 Introduction 155 The First Amendment 202 Other Charges to Consider 227 No Prosecution for Interstate Transportation or Receipt of Stolen Property 304 Offenses Involving the Economic Espionage Act (EEA) 334 488 J JUDICIAL NOTICE Proof of Copyright at Trial 24 The Genuine Mark Must Be Federally Registered on the U.S. Patent and Trademark Office’s Principal Register 110 JURY INSTRUCTIONS See Appendices B-F JUSTICE FOR ALL ACT OF 2004 Victims’ Rights 388 K KNOWINGLY Other Charges to Consider 81 Overview 91 The Trademark Counterfeiting Crime in General 94 Intentionally Trafficked in Goods or Services (or Labels, Documentation, or Packaging for Goods or Services) 102 The Defendant Used a “Counterfeit Mark”: Definition of a Counterfeit Mark 104 The Defendant Used the Counterfeit Mark “Knowingly” 121 Trafficking in Counterfeit Drugs 128 Fines and Imprisonment 146 Overview 157 Knowledge 177 Product or Service Used or Intended for Use in Interstate or Foreign Commerce 186 Purpose or Marketing of Circumvention Technology 256 Knowingly Marketed for Circumvention 258 Falsifying, Altering, or Removing Copyright Management Information 262 The Defendant Acted “Knowingly” 283 Federal Jurisdiction 290 Prosecuting Intellectual Property Crimes L M LANHAM ACT See generally Chapter III MAIL AND WIRE FRAUD Other Charges to Consider 85 Other Charges to Consider 151 Other Charges to Consider 226 Other Charges to Consider 296 Identifying Victims Who Qualify for Restitution 352 Appendix A LETTERS PATENT Overview of Patent 297 Forgery of Letters Patent 298 LIBRARIAN OF CONGRESS Regulatory Exemptions to Liability Under § 1201(a)(1) 250 Librarian of Congress Regulations 263 LIKELIHOOD OF CONFUSION The Counterfeit Mark Must Be Identical to or Indistinguishable from a Genuine Mark Owned by Another 107 Likelihood of Confusion, Mistake, or Deception 116 LIMITED FEDERAL RESOURCES The Nature and Seriousness of the Offense 380 LIMITED TIMES What Copyright Law Protects 10 Legal Basis for Copyright and Related Laws 11 Other Charges to Consider 83 Constitutionality of the DMCA 272 Overview of Patent 297 LINUX Primarily Designed or Produced 257 Reverse Engineering and Interoperability of Computer Programs 266 LIVE MUSICAL PERFORMANCES Other Charges to Consider 81 Other Charges to Consider 152 Offenses Involving Copyright 311 Property Subject to Forfeiture 360 Table of Forfeiture Provisions Arranged by Criminal IP Statute 362 Index MAKING AVAILABLE Distribution 42 Distribution 52 MANDAMUS The Information Was a Trade Secret 162 Interlocutory Appeals 207 Victims’ Rights 388 MANDATORY VICTIMS RESTITUTION ACT OF 1996 (MVRA) Restitution 223 Restitution is Available—and Often Required—in Intellectual Property Prosecutions 343 MARKET STRATEGIES Trade Secrets 8 MINIMAL NOVELTY Secrecy 164 MISAPPROPRIATION See generally Chapter IV Overview 158 Offenses Involving the Economic Espionage Act (EEA) 331 Methods of Calculating Loss 333 MISBRANDED FOOD, DRUGS, AND COSMETICS Repackaging Genuine Goods 137 Other Charges to Consider 152 Vulnerable Victims 330 Restitution is Available—and Often Required—in Intellectual Property Prosecutions 347 489 MISLABELED WOOL, FUR, AND TEXTILE FIBER PRODUCTS Other Charges to Consider 152 MISMARKING False Marking of Patent 303 MISREPRESENTATION Other Charges to Consider 85 Advice of Counsel 201 Due Process and Prosecutorial Misconduct Considerations 216 False Marking of Patent 303 MONEY LAUNDERING Other Charges to Consider 87 Other Charges to Consider 153 Table of Forfeiture Provisions Arranged by Criminal IP Statute 362 Proceeds 372 MOTION FOR A NEW TRIAL Victims’ Rights 388 MOVIES AND MOTION PICTURES “Preregistration” of Certain Types of Works 21 Infringement by Reproduction or Distribution 36 Work Being Prepared for Commercial Distribution 54 The First Sale Doctrine 64 Internet Streaming 76 Other Charges to Consider 83 Access Controls vs. Copy/Use Controls 236 Circumventing 243 Primarily Designed or Produced 256 Reverse Engineering and Interoperability of Computer Programs 265 Distinguished from Trademark and Copyright Statutes 281 Trafficking in Labels … 285 Offenses Involving Copyright 311 Domain Name Forfeiture 372 MULTIPLE CRIME VICTIMS Victims’ Rights 389 490 N NO ELECTRONIC THEFT (NET) ACT Elements 17 History 56 Legal Standard 57 Offenses Involving Copyright 311 NONPROFIT USE Fair Use in Criminal Cases 73 NUMBER OF INFRINGING ITEMS Sentencing Guidelines 293 Number of Infringing Items 314 Determining Amounts and Values— Reasonable Estimates Allowed 321 O OLYMPIC CHARTER ACT The Defendant Used a “Counterfeit Mark”: Definition of a Counterfeit Mark 104 Olympic Symbols 145 OLYMPIC SYMBOLS The Genuine Mark Must Be Federally Registered ... 110 The Genuine Mark Must Have Been in Use by the Mark-Holder or Its Licensee 112 Olympic Symbols 145 ONLINE INFRINGEMENT Distribution 41 Distribution of a Work 51 Internet Streaming 76 ORIGINAL WORK FIXED IN A TANGIBLE MEDIUM See TANGIBLE MEDIUM ORIGINAL WORK OF AUTHORSHIP Copyrights vs. Registrations vs. Certificates 20 Constitutionality of the DMCA 272 Overview of Patent 298 OVERBREADTH The First Amendment 273 Prosecuting Intellectual Property Crimes OVERRUN GOODS Overrun Goods 130 P PACKING SLIPS The Labels, Documentation, or Packaging Materials Are Counterfeit or Illicit 287 PARALLEL IMPORTS Authorized-Use Defense: Gray Market Goods 133 PARALLEL PROCEEDINGS Parallel Proceedings 215 Global Settlement Negotiations 392 Parallel Civil Suits 393 PASSWORD Reasonable Measures 171 Access Controls vs. Copy/Use Controls 235 Circumventing 244 PATENT See generally Chapter VII Patents 7 Copyrightability 18 Information is Not Secret 195 Parallel Development 198 Methods of Calculating Loss 338 PEER-TO-PEER Reproduction 41 Distribution of a Work … 51 Fair Use in Criminal Cases 72 Determining a Restitution Figure 354 PERFORMANCES AND PHONOGRAMS TREATY DMCA’s Background and Purpose 233 PHONORECORDS Elements 16 Infringement of the Copyright 33 Infringement of at Least 10 Copies ... 47 Trafficking in Labels Affixed to, Enclosing ... 285 Property Subject to Forfeiture 360 Index PORNOGRAPHY Restricting Minors’ Access to the Internet 269 POST-SALE CONFUSION Likelihood of Confusion, Mistake, or Deception 117 PREEMPTION Federal Preemption 12 Other Charges to Consider 231 Whether the Person Is Subject to Prosecution in Another Jurisdiction 383 PREREGISTRATION “Preregistration” of Certain Types of Works 20 Work Being Prepared for Commercial Distribution 53 PRE-RELEASE PIRACY Elements 16 Distribution of a Work … 51 Emerging and Special Issues 76 Retail Value 320 Pre-release Piracy Increases the Offense Level by 2 324 PRESCRIPTION DRUGS Protecting consumers from fraud 93 PRINCIPLES OF FEDERAL PROSECUTION Introduction 377 Special Considerations in Deciding Whether to Charge Corporations and Other Business Organizations 385 PRIOR APPROVAL Other Charges to Consider 152 Department of Justice Oversight 222 Other Charges to Consider 230 Gift Issues 398 PRIVATE FINANCIAL GAIN See PURPOSES OF COMMERCIAL ADVANTAGE OR PRIVATE FINANCIAL GAIN PRIVATE INVESTIGATORS Determining a Restitution Figure 356 The Individual’s History of Criminal 491 Offenses and Civil Intellectual Property Violations 382 Offers of Assistance From Victims and Related Parties 397 Private Investigators 401 PRODUCT TAMPERING See TAMPERING PROSECUTORIAL PRIORITIES Federal Law Enforcement Priorities 378 PROTECTING AMERICAN GOODS AND SERVICES ACT OF 2005 Overview 90 Trafficked 99 PROTECTIVE ORDERS See generally Chapter IV.D. Reasonable Measures 174 Domain Name Forfeiture 374 Stays and Protective Orders to Delay Civil Proceedings During Criminal Prosecution 396 PUBLIC DOMAIN See generally Chapter IV.C.6. Copyright Notice 25 Reproduction 37 Elements in the Public Domain 166 Information is Not Secret 194 Claim of Right—Public Domain and Proprietary Rights 201 To a Copyrighted Work 248 Congress’s Constitutional Authority to Enact § 1201 of the DMCA 272 Fair Use 279 False Marking of Patent 300 PUBLIC DISTRIBUTION Copyright 6 The Rights Protected by Copyright 14 PUBLIC PERFORMANCE Copyright 6 The Rights Protected by Copyright 14 Proof of Copyright at Trial 24 Distribution 41 Jurisdiction 62 Internet Streaming 77 492 PUBLICALLY ACCESSIBLE COMPUTER NETWORK See ACCESSIBLE TO THE GENERAL PUBLIC PURPOSES OF COMMERCIAL ADVANTAGE OR PRIVATE FINANCIAL GAIN When Infringement Is Criminal 15 Elements 16 Additional Element for Enhanced Sentence ... 55 Misdemeanor Copyright Infringement 59 Fair Use in Criminal Cases 73 Internet Streaming 78 Cyberlockers and Linking Sites 78 Statutory Penalties 80 Other Charges to Consider 81 Trafficked 98 Consideration vs. Commercial Advantage and Private Financial Gain 99 Additional 18 U.S.C. § 1832 Elements 185 Other Charges to Consider 225 Key Concepts: Access Controls vs. Copy Controls, Circumvention vs. Trafficking 234 Circumventing Access Controls 241 Trafficking in Access Control Circumvention Tools and Services 253 Trafficking in Tools, Devices, and Services to Circumvent Copy Controls 259 Falsifying, Altering, or Removing Copyright Management Info. 262 The Defendant Trafficked 284 Offenses Involving Copyright … 311 Offense Not Committed for Commercial Advantage or Private Financial Gain Reduces the Offense Level by 2 326 Q QUID PRO QUO Consideration vs. Commercial Advantage and Private Financial Gain 100 Prosecuting Intellectual Property Crimes R RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS (RICO) Other Charges to Consider 87 Other Charges to Consider 152 Other Charges to Consider 296 Proceeds 369 READ-ALOUD Regulatory Exemptions to Liability Under § 1201(a)(1) 250 READILY ASCERTAINABLE BY THE PUBLIC Elements Common to 18 U.S.C. §§ 1831, 1832 163 Information is Not Secret 194 Reverse Engineering 199 Void-for-Vagueness 204 REASONABLE MEASURES Elements Common to 18 U.S.C. §§ 1831, 1832 162 Reasonable Measures 169 Knowledge 178 Owner Failed to Take Reasonable Measures to Protect Secrecy 193 Void-for-Vagueness 204 REASONABLE ROYALTY Methods of Calculating Loss 337 REASONABLY FORESEEABLE PECUNIARY HARM Loss 332 RECKLESS DISREGARD Legal Standard 26 REGISTER OF COPYRIGHTS When Copyright Protection Begins and Ends 13 Infringement by Reproduction or Distribution 38 REGISTRATION When Copyright Protection Begins and Ends 13 Existence of a Copyright 20 Definition of “Retail Value” as an Element Index of the Offense 49 Emerging and Special Issues 76 Goods and Services 103 The Defendant Used a “Counterfeit Mark”: Definition of a Counterfeit Mark 110 Lanham Act Defenses 137 Mark-Holder’s Failure to Use ® Symbol 142 Restitution 148 RELATED PARTIES Offers of Assistance From Victims and Related Parties 397 RENTAL OF SOFTWARE Proof at Trial 33 REPACKAGING OF AUTHENTIC OR GENUINE GOODS Fair Use 70 Importing and Exporting Related to Transporting 103 Not Genuine or Authentic 105 Repackaging Genuine Goods 134 RESTITUTION See generally Chapters III.E.2., IV.F.1.c., VI.E.3., VIII, Appendix I RETAIL VALUE When Infringement Is Criminal 15 Elements 16 Infringement of at Least 10 Copies of 1 or More Copyrighted ... 47 Misdemeanor Copyright Infringement 59 Sentencing Guidelines 150 Sentencing Guidelines 293 Offenses Involving Copyright 311 REVERSE ENGINEERING Elements Common to 18 U.S.C. §§ 1831, 1832 162 Reverse Engineering 199 Reverse Engineering and Interoperability of Computer Programs 264 RICO See RACKETEER INFLUENCED AND CORRUPT ORGANIZATIONS 493 S SATELLITE SERVICE See CABLE AND SATELLITE SERVICE SECRECY Overview 161 Secrecy 164 Owner Failed to Take Reasonable Measures to Protect Secrecy 193 SECURITY TESTING Security Testing 270 SENTENCING GUIDELINES See generally Chapter VIII Definition of “Retail Value” as an Element of the Offense 48 Sentencing Guidelines 80 Restitution 146 Sentencing Guidelines 149 Sentencing Guidelines 224 Restitution 292 Sentencing Guidelines 293 SERVICE MARKS See generally Chapter III Trademarks and Service Marks 6 Property Subject to Forfeiture 360 SHAM USE The Genuine Mark Must Have Been in Use by the Mark-Holder or Its Licensee 113 SHORT PHRASES Short Phrases Are Not Copyrightable 18 SOFTWARE See generally Chapter VI “Preregistration” of Certain Types of Works 21 Infringement of the Copyright 33 Infringement by Reproduction or Distribution 34 Distribution 39 Definition of “Retail Value” as an Element of the Offense 48 Work Being Prepared for Commercial Distribution 54 494 Legal Standard 58 Operation of the Doctrine 64 “Archival Exception” for Computer Software 74 Elements in the Public Domain 166 Product or Service Used or Intended for Use in Interstate or Foreign Commerce 187 Differences Between the DMCA and Traditional Copyright Law 239 Regulatory Exemptions to Liability Under § 1201(a)(1) 250 Information Security Exemption 264 SOLICITATION OF GIFTS See GIFTS SOPHISTICATED MEANS Sophisticated Means 340 Abuse of a Position of Trust 342 Use of Special Skill 342 SOUND RECORDINGS Federal Preemption 14 “Preregistration” of Certain Types of Works 20 Infringement of the Copyright 33 Work Being Prepared for Commercial Distribution 53 Venue 63 Special Rules for Rental, Lease, and Lending 68 Distinguished from Trademark and Copyright Statutes 281 Federal Jurisdiction 289 SPECIAL SKILL Sentencing Guidelines 310 Decryption or Circumvention of Access Controls May Increase the Offense Level 329 Sophisticated Means 340 Use of Special Skill 342 SPECIFIED UNLAWFUL ACTIVITY Other Charges to Consider 87 Civil Forfeiture in Intellectual Property Matters 369 Prosecuting Intellectual Property Crimes SPURIOUS MARK Not Genuine or Authentic 104 The Counterfeit Mark Must Be Identical to or Indistinguishable from a Genuine Mark Owned by Another 106 STATE AND LOCAL Other Charges to Consider 231 Federal Law Enforcement Priorities 379 Whether the Person Is Subject to Prosecution in Another Jurisdiction 383 STATUTE OF LIMITATION Statute of Limitations: 5 years 60 Statute of Limitations 138 Means of Misappropriation 174 Statute of Limitations 263 Statute of Limitations 290 STATUTORY DAMAGES When Copyright Protection Begins and Ends 13 The Defendant Acted “Willfully” 29 Determining a Restitution Figure 355 Parallel Civil Suits 393 STING OPERATIONS Information is Not Secret 197 Void-for-Vagueness 20 3 Use Greater of Actual or Intended Loss 332 STIPULATION Types of Protective Orders 210 Identifying Victims Who Qualify for Restitution 351 STOP COUNTERFEITING IN MANUFACTURED GOODS ACT Overview 90 Intentionally 98 Goods and Services … 103 Likelihood of Confusion, Mistake, or Deception 118 The Defendant Used the Counterfeit Mark “Knowingly” 122 Authorized-Use Defense: Overrun Goods 130 Repackaging Genuine Goods 134 Sentencing Guidelines 294 Index Applicable Guideline is § 2B5.3 312 Retail Value 320 Restitution is Available—and Often Required—in Intellectual Property Prosecutions 344 STORAGE COSTS Storage Costs and Destruction 142 Storage Costs in Counterfeit or Infringing Products Cases 403 STUDIO OUT-TAKES Other Charges to Consider 82 SUBPOENAS The Genuine Mark Must Be Federally Registered on the U.S. Patent and Trademark Office’s Principal Register 111 Pre-Trial Protective Order Issues 211 Other DMCA Sections That Do Not Concern Prosecutors 240 Advantages and Disadvantages of Parallel Civil and Criminal Proceedings 396 Assistance from Private Third Parties 404 SUBSTANTIAL STEP Attempts and Conspiracies, Including the Impossibility Defense 189 SUBSTANTIALLY OVERSTATES THE SERIOUSNESS OF THE OFFENSE Downward Departure Considerations 341 T TAMPERING Other Charges to Consider 152 TANGIBLE MEDIUM What Copyright Law Protects 10 Existence of a Copyright 18 Other Charges to Consider 81 TECHNICAL JOURNAL Information is Not Secret 196 495 TECHNOLOGICAL MEASURES See generally Chapter V Number of Infringing Items 315 Identifying Victims Who Qualify for Restitution 348 THE GREATER OF ACTUAL LOSS OR INTENDED LOSS Loss 332 THREATS OF PROSECUTION Victims Who Seek Advantage by Threats of Criminal Prosecution 391 TIMELY NOTICE OF ANY PUBLIC COURT PROCEEDING Victims’ Rights 388 TRADE SHOWS Information is Not Secret 196 TRADE SECRETS See generally Chapters I, IV Expression of an Idea vs. Idea Itself 19 Overview of Patent 298 The Statutory Sentencing Factors 308 Offenses Involving the Economic Espionage Act (EEA) 331 Identifying Victims Who Qualify for Restitution 348 Determining a Restitution Figure 353 Table of Forfeiture Provisions Arranged by Criminal IP Statute 364 Introduction 378 Whether the Person Is Subject to Prosecution in Another Jurisdiction 383 Gift Issues 400 TRADEMARKS See generally Chapters I, III, VIII.C.1 Short Phrases Are Not Copyrightable 19 Distinguished from Trademark and Copyright Statutes 281 The Labels, Documentation, or Packaging Materials Are Counterfeit or Illicit 286 Advantages of Charging a § 2318 Offense 291 Sentencing Guidelines 293 Other Charges to Consider 296 The Statutory Sentencing Factors 308 496 Restitution is Available—and Often Required—in Intellectual Property Prosecutions 343 Determining a Restitution Figure 352 Property Subject to Forfeiture 360 Civil Forfeiture in Intellectual Property Matters 369 Parallel Civil Suits 393 Storage Costs in Counterfeit or Infringing Products Cases 403 TRAFFICKING IN ACCESS CONTROL CIRCUMVENTION Trafficking in Access Control Circumvention Tools and Services 253 TREBLE DAMAGES Global Settlement Negotiations 392 U UNAUTHORIZED DISCLOSURE OF GOVERNMENT INFORMATION Introduction 155 UNIFORM TRADE SECRETS ACT Introduction 156 Relevance of Civil Cases 162 Elements Common to 18 U.S.C. §§ 1831, 1832 168 Void-for-Vagueness 204 Methods of Calculating Loss 336 UNITS OF PROSECUTION Units of Prosecution 143 False Marking of Patent 302 UNPUBLISHED COPYRIGHTED WORK Unpublished Works 71 UPLOADING Distribution 41 Additional Element for Enhanced Sentence: Purpose of Commercial Advantage or Private Financial Gain 55 Overview 158 Means of Misappropriation 174 Applicable Guideline is § 2B5.3 311 Prosecuting Intellectual Property Crimes Manufacturing, Importing, or Uploading Infringing Items Increases the Offense Level by 2 324 The Nature and Seriousness of the Offense 380 USE IN COMMERCE The Genuine Mark Must Have Been in Use by the Mark-Holder or Its Licensee 113 UTILITY PATENTS Patents 7 V VAGUENESS Vagueness Challenges 139 Reasonable Measures 174 Knowledge 179 Void-for-Vagueness 203 Vagueness 276 VENUE Venue 63 Venue 129 Venue 290 VICTIM AND WITNESS PROTECTION ACT OF 1982 Determining a Restitution Figure 354 Victims’ Rights 387 VULNERABLE VICTIMS Vulnerable Victims 330 W WILLFUL BLINDNESS Proof at Trial 32 The Defendant Used the Counterfeit Mark “Knowingly” 122 The Defendant Acted “Knowingly” 284 WORK BEING PREPARED FOR COMMERCIAL DISTRIBUTION Elements 16 Proof at Trial 34 Retail Value for Pre-release Works 50 Distribution of a Work Being Prepared for Commercial Distribution … 51 Retail Value 319 Pre-release Piracy Increases the Offense Level by 2 324 WORKS MADE FOR HIRE When Copyright Protection Begins and Ends 13 WORLD INTELLECTUAL PROPERTY ORGANIZATION (WIPO) DMCA’s Background and Purpose 233 WRIT OF MANDAMUS See Mandamus VICTIM’S PARTICIPATION No Downward Departure for the Victim’s Participation in Prosecution 330 No Downward Departure for Victim’s Participation in Developing the Case 342 VICTIMS’ RIGHTS Victims’ Rights 387 VIDEO GAMES “Preregistration” of Certain Types of Works 21 How Congress Intended the AntiCircumvention Prohibition to Apply 248 Trafficking in Access Control Circumvention Tools and Services 256 Circumventing 260 Index 497
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : Yes Tagged PDF : Yes XMP Toolkit : Adobe XMP Core 5.0-c060 61.134777, 2010/02/12-17:32:00 Instance ID : uuid:cd2c972f-04a6-484c-b71c-0d5be36e8eba Document ID : xmp.did:05F6D3A51EA9E211BE17E3C3C0052E21 Original Document ID : adobe:docid:indd:db0071f9-7593-11df-a4be-b230a4f05d12 Rendition Class : proof:pdf Derived From Instance ID : xmp.iid:04F6D3A51EA9E211BE17E3C3C0052E21 Derived From Document ID : xmp.did:8A987BF112A9E211BE17E3C3C0052E21 Derived From Original Document ID: adobe:docid:indd:db0071f9-7593-11df-a4be-b230a4f05d12 Derived From Rendition Class : default History Action : saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved, saved History Instance ID : xmp.iid:AF2555FD1690DF11B47987A623E75ADF, xmp.iid:B02555FD1690DF11B47987A623E75ADF, xmp.iid:B42555FD1690DF11B47987A623E75ADF, xmp.iid:B62555FD1690DF11B47987A623E75ADF, xmp.iid:EAC8CFDF4890DF11B47987A623E75ADF, xmp.iid:ECC8CFDF4890DF11B47987A623E75ADF, xmp.iid:EEC8CFDF4890DF11B47987A623E75ADF, xmp.iid:EFC8CFDF4890DF11B47987A623E75ADF, xmp.iid:F2C8CFDF4890DF11B47987A623E75ADF, xmp.iid:F3C8CFDF4890DF11B47987A623E75ADF, xmp.iid:C915A83D5590DF11B47987A623E75ADF, xmp.iid:CB15A83D5590DF11B47987A623E75ADF, xmp.iid:CD15A83D5590DF11B47987A623E75ADF, xmp.iid:CF15A83D5590DF11B47987A623E75ADF, xmp.iid:D115A83D5590DF11B47987A623E75ADF, xmp.iid:D315A83D5590DF11B47987A623E75ADF, xmp.iid:BD4D357BF990DF11B52BB53F52E3F5F8, xmp.iid:BE4D357BF990DF11B52BB53F52E3F5F8, xmp.iid:FC585D274893DF11B5239021F7E3AC8B, xmp.iid:FE585D274893DF11B5239021F7E3AC8B, xmp.iid:00595D274893DF11B5239021F7E3AC8B, xmp.iid:02595D274893DF11B5239021F7E3AC8B, xmp.iid:04595D274893DF11B5239021F7E3AC8B, xmp.iid:72C301195993DF11B5239021F7E3AC8B, xmp.iid:75C301195993DF11B5239021F7E3AC8B, xmp.iid:77C301195993DF11B5239021F7E3AC8B, xmp.iid:79C301195993DF11B5239021F7E3AC8B, xmp.iid:7AC301195993DF11B5239021F7E3AC8B, xmp.iid:7CC301195993DF11B5239021F7E3AC8B, xmp.iid:54B2ECA58093DF11B5239021F7E3AC8B, xmp.iid:AC693A554494DF11BE809647A5C2507A, xmp.iid:AE693A554494DF11BE809647A5C2507A, xmp.iid:1DEE0318C895DF11ACCAFFA99B6FBAEC, xmp.iid:9C4732E9D795DF11AF31E9E2F21F9F64, xmp.iid:9E4732E9D795DF11AF31E9E2F21F9F64, xmp.iid:9F4732E9D795DF11AF31E9E2F21F9F64, xmp.iid:A14732E9D795DF11AF31E9E2F21F9F64, xmp.iid:A34732E9D795DF11AF31E9E2F21F9F64, xmp.iid:1019CD956C96DF11B85F86DB31C153C0, xmp.iid:1219CD956C96DF11B85F86DB31C153C0, xmp.iid:1319CD956C96DF11B85F86DB31C153C0, xmp.iid:1419CD956C96DF11B85F86DB31C153C0, xmp.iid:1519CD956C96DF11B85F86DB31C153C0, xmp.iid:1719CD956C96DF11B85F86DB31C153C0, xmp.iid:1819CD956C96DF11B85F86DB31C153C0, xmp.iid:621BA2837796DF11B85F86DB31C153C0, xmp.iid:641BA2837796DF11B85F86DB31C153C0, xmp.iid:91294F86D698DF11B85E874957035255, xmp.iid:93294F86D698DF11B85E874957035255, xmp.iid:95294F86D698DF11B85E874957035255, xmp.iid:80C538BDA699DF1182F7F17AED3F13DF, xmp.iid:82C538BDA699DF1182F7F17AED3F13DF, xmp.iid:0F9493D55B9ADF11873BD47AA4DFFCC0, xmp.iid:119493D55B9ADF11873BD47AA4DFFCC0, xmp.iid:139493D55B9ADF11873BD47AA4DFFCC0, xmp.iid:159493D55B9ADF11873BD47AA4DFFCC0, xmp.iid:169493D55B9ADF11873BD47AA4DFFCC0, xmp.iid:BFD82D63749ADF11873BD47AA4DFFCC0, xmp.iid:C1D82D63749ADF11873BD47AA4DFFCC0, xmp.iid:C3D82D63749ADF11873BD47AA4DFFCC0, xmp.iid:C7D82D63749ADF11873BD47AA4DFFCC0, xmp.iid:C9D82D63749ADF11873BD47AA4DFFCC0, xmp.iid:AF3CADEA8F9ADF11873BD47AA4DFFCC0, xmp.iid:12A656EC53A6DF11BA75B340791BE004, xmp.iid:14A656EC53A6DF11BA75B340791BE004, xmp.iid:C5D863A71AA7DF119865DCB74FA82B01, xmp.iid:C7D863A71AA7DF119865DCB74FA82B01, xmp.iid:C8D863A71AA7DF119865DCB74FA82B01, xmp.iid:CAD863A71AA7DF119865DCB74FA82B01, xmp.iid:CCD863A71AA7DF119865DCB74FA82B01, xmp.iid:2D08B12FC3C1DF119C1CE8F20A6C2F21, xmp.iid:2F08B12FC3C1DF119C1CE8F20A6C2F21, xmp.iid:3108B12FC3C1DF119C1CE8F20A6C2F21, xmp.iid:A0A646BCC6C1DF119C1CE8F20A6C2F21, xmp.iid:A2A646BCC6C1DF119C1CE8F20A6C2F21, xmp.iid:A3A646BCC6C1DF119C1CE8F20A6C2F21, xmp.iid:A5A646BCC6C1DF119C1CE8F20A6C2F21, xmp.iid:A7A646BCC6C1DF119C1CE8F20A6C2F21, xmp.iid:A8A646BCC6C1DF119C1CE8F20A6C2F21, xmp.iid:AAA646BCC6C1DF119C1CE8F20A6C2F21, xmp.iid:271EDEB3C7C1DF119C1CE8F20A6C2F21, xmp.iid:291EDEB3C7C1DF119C1CE8F20A6C2F21, xmp.iid:2A1EDEB3C7C1DF119C1CE8F20A6C2F21, xmp.iid:2C1EDEB3C7C1DF119C1CE8F20A6C2F21, xmp.iid:2D1EDEB3C7C1DF119C1CE8F20A6C2F21, xmp.iid:2F1EDEB3C7C1DF119C1CE8F20A6C2F21, xmp.iid:311EDEB3C7C1DF119C1CE8F20A6C2F21, xmp.iid:82F03C61C9C1DF119C1CE8F20A6C2F21, xmp.iid:84F03C61C9C1DF119C1CE8F20A6C2F21, xmp.iid:86F03C61C9C1DF119C1CE8F20A6C2F21, xmp.iid:88F03C61C9C1DF119C1CE8F20A6C2F21, xmp.iid:89F03C61C9C1DF119C1CE8F20A6C2F21, xmp.iid:8BF03C61C9C1DF119C1CE8F20A6C2F21, xmp.iid:0E5EDCA3CCC1DF119C1CE8F20A6C2F21, xmp.iid:105EDCA3CCC1DF119C1CE8F20A6C2F21, xmp.iid:D722023C50C2DF118221CDFD85EF009D, xmp.iid:D822023C50C2DF118221CDFD85EF009D, xmp.iid:DA22023C50C2DF118221CDFD85EF009D, xmp.iid:DC22023C50C2DF118221CDFD85EF009D, xmp.iid:DD22023C50C2DF118221CDFD85EF009D, xmp.iid:DF22023C50C2DF118221CDFD85EF009D, xmp.iid:581C060078C2DF118221CDFD85EF009D, xmp.iid:5A1C060078C2DF118221CDFD85EF009D, xmp.iid:5C1C060078C2DF118221CDFD85EF009D, xmp.iid:5E1C060078C2DF118221CDFD85EF009D, xmp.iid:601C060078C2DF118221CDFD85EF009D, xmp.iid:621C060078C2DF118221CDFD85EF009D, xmp.iid:BDB8820786C2DF118221CDFD85EF009D, xmp.iid:BFB8820786C2DF118221CDFD85EF009D, xmp.iid:C1B8820786C2DF118221CDFD85EF009D, xmp.iid:C5B8820786C2DF118221CDFD85EF009D, xmp.iid:F8C2DFF389C2DF118221CDFD85EF009D, xmp.iid:F9C2DFF389C2DF118221CDFD85EF009D, xmp.iid:FBC2DFF389C2DF118221CDFD85EF009D, xmp.iid:FCC2DFF389C2DF118221CDFD85EF009D, xmp.iid:FEC2DFF389C2DF118221CDFD85EF009D, xmp.iid:00C3DFF389C2DF118221CDFD85EF009D, xmp.iid:02C3DFF389C2DF118221CDFD85EF009D, xmp.iid:AA9152488EC2DF118221CDFD85EF009D, xmp.iid:AC9152488EC2DF118221CDFD85EF009D, xmp.iid:AE9152488EC2DF118221CDFD85EF009D, xmp.iid:B09152488EC2DF118221CDFD85EF009D, xmp.iid:B29152488EC2DF118221CDFD85EF009D, xmp.iid:DA747EEADEC4DF1187B6992540764603, xmp.iid:DC747EEADEC4DF1187B6992540764603, xmp.iid:DD747EEADEC4DF1187B6992540764603, xmp.iid:DF747EEADEC4DF1187B6992540764603, xmp.iid:05397CC69BC5DF11B0D7E270869F5012, xmp.iid:07397CC69BC5DF11B0D7E270869F5012, xmp.iid:08397CC69BC5DF11B0D7E270869F5012, xmp.iid:0A397CC69BC5DF11B0D7E270869F5012, xmp.iid:0C397CC69BC5DF11B0D7E270869F5012, xmp.iid:0D397CC69BC5DF11B0D7E270869F5012, xmp.iid:E9627F64ABC5DF11B0D7E270869F5012, xmp.iid:EA627F64ABC5DF11B0D7E270869F5012, xmp.iid:EB627F64ABC5DF11B0D7E270869F5012, xmp.iid:2C1231AD13C7DF119A788A82A9C43A57, xmp.iid:2E1231AD13C7DF119A788A82A9C43A57, xmp.iid:301231AD13C7DF119A788A82A9C43A57, xmp.iid:321231AD13C7DF119A788A82A9C43A57, xmp.iid:341231AD13C7DF119A788A82A9C43A57, xmp.iid:84F9B85328C7DF119A788A82A9C43A57, xmp.iid:86F9B85328C7DF119A788A82A9C43A57, xmp.iid:88F9B85328C7DF119A788A82A9C43A57, xmp.iid:89F9B85328C7DF119A788A82A9C43A57, xmp.iid:8BF9B85328C7DF119A788A82A9C43A57, xmp.iid:8CF9B85328C7DF119A788A82A9C43A57, xmp.iid:8EF9B85328C7DF119A788A82A9C43A57, xmp.iid:60A67F514FC7DF119A788A82A9C43A57, xmp.iid:62A67F514FC7DF119A788A82A9C43A57, xmp.iid:64A67F514FC7DF119A788A82A9C43A57, xmp.iid:66A67F514FC7DF119A788A82A9C43A57, xmp.iid:68A67F514FC7DF119A788A82A9C43A57, xmp.iid:A62F7D4F51C7DF119A788A82A9C43A57, xmp.iid:A82F7D4F51C7DF119A788A82A9C43A57, xmp.iid:AA2F7D4F51C7DF119A788A82A9C43A57, xmp.iid:AC2F7D4F51C7DF119A788A82A9C43A57, xmp.iid:AE2F7D4F51C7DF119A788A82A9C43A57, xmp.iid:B02F7D4F51C7DF119A788A82A9C43A57, xmp.iid:9ECD03BDD5C7DF11B10EE21769EB4B3A, xmp.iid:A0CD03BDD5C7DF11B10EE21769EB4B3A, xmp.iid:A2CD03BDD5C7DF11B10EE21769EB4B3A, xmp.iid:A4CD03BDD5C7DF11B10EE21769EB4B3A, xmp.iid:A6CD03BDD5C7DF11B10EE21769EB4B3A, xmp.iid:0E076322DCC7DF11B10EE21769EB4B3A, xmp.iid:10076322DCC7DF11B10EE21769EB4B3A, xmp.iid:12076322DCC7DF11B10EE21769EB4B3A, xmp.iid:45B9C925DDC7DF119A9DA10FB4EA6232, xmp.iid:47B9C925DDC7DF119A9DA10FB4EA6232, xmp.iid:48B9C925DDC7DF119A9DA10FB4EA6232, xmp.iid:49B9C925DDC7DF119A9DA10FB4EA6232, xmp.iid:4BB9C925DDC7DF119A9DA10FB4EA6232, xmp.iid:4DB9C925DDC7DF119A9DA10FB4EA6232, xmp.iid:AEC67D0DE4C7DF119A9DA10FB4EA6232, xmp.iid:B0C67D0DE4C7DF119A9DA10FB4EA6232, xmp.iid:B2C67D0DE4C7DF119A9DA10FB4EA6232, xmp.iid:73C92891EEC7DF11AE73FA65D79D715D, xmp.iid:75C92891EEC7DF11AE73FA65D79D715D, xmp.iid:76C92891EEC7DF11AE73FA65D79D715D, xmp.iid:78C92891EEC7DF11AE73FA65D79D715D, xmp.iid:2EA9232CF0C7DF11AE73FA65D79D715D, xmp.iid:30A9232CF0C7DF11AE73FA65D79D715D, xmp.iid:32A9232CF0C7DF11AE73FA65D79D715D, xmp.iid:34A9232CF0C7DF11AE73FA65D79D715D, xmp.iid:36A9232CF0C7DF11AE73FA65D79D715D, xmp.iid:38A9232CF0C7DF11AE73FA65D79D715D, xmp.iid:3D118685F1C7DF11AE73FA65D79D715D, xmp.iid:3F118685F1C7DF11AE73FA65D79D715D, xmp.iid:41118685F1C7DF11AE73FA65D79D715D, xmp.iid:43118685F1C7DF11AE73FA65D79D715D, xmp.iid:45118685F1C7DF11AE73FA65D79D715D, xmp.iid:B231467FF2C7DF11AE73FA65D79D715D, xmp.iid:B431467FF2C7DF11AE73FA65D79D715D, xmp.iid:B631467FF2C7DF11AE73FA65D79D715D, xmp.iid:B831467FF2C7DF11AE73FA65D79D715D, xmp.iid:BC31467FF2C7DF11AE73FA65D79D715D, xmp.iid:26085A9EF3C7DF11AE73FA65D79D715D, xmp.iid:28085A9EF3C7DF11AE73FA65D79D715D, xmp.iid:29085A9EF3C7DF11AE73FA65D79D715D, xmp.iid:2B085A9EF3C7DF11AE73FA65D79D715D, xmp.iid:2C085A9EF3C7DF11AE73FA65D79D715D, xmp.iid:2D085A9EF3C7DF11AE73FA65D79D715D, xmp.iid:2E085A9EF3C7DF11AE73FA65D79D715D, xmp.iid:30085A9EF3C7DF11AE73FA65D79D715D, xmp.iid:096C7C06F6C7DF11AE73FA65D79D715D, xmp.iid:0B6C7C06F6C7DF11AE73FA65D79D715D, xmp.iid:0C6C7C06F6C7DF11AE73FA65D79D715D, xmp.iid:0E6C7C06F6C7DF11AE73FA65D79D715D, xmp.iid:70401A8BCECFDF1183D595EC0F46FBCD, xmp.iid:72401A8BCECFDF1183D595EC0F46FBCD, xmp.iid:73401A8BCECFDF1183D595EC0F46FBCD, xmp.iid:75401A8BCECFDF1183D595EC0F46FBCD, xmp.iid:76401A8BCECFDF1183D595EC0F46FBCD, xmp.iid:78401A8BCECFDF1183D595EC0F46FBCD, xmp.iid:761967B5E1CFDF1183D595EC0F46FBCD, xmp.iid:781967B5E1CFDF1183D595EC0F46FBCD, xmp.iid:7A1967B5E1CFDF1183D595EC0F46FBCD, xmp.iid:7C1967B5E1CFDF1183D595EC0F46FBCD, xmp.iid:7E1967B5E1CFDF1183D595EC0F46FBCD, xmp.iid:E930A1B9E4CFDF1183D595EC0F46FBCD, xmp.iid:EA30A1B9E4CFDF1183D595EC0F46FBCD, xmp.iid:EC30A1B9E4CFDF1183D595EC0F46FBCD, xmp.iid:ED30A1B9E4CFDF1183D595EC0F46FBCD, xmp.iid:EF30A1B9E4CFDF1183D595EC0F46FBCD, xmp.iid:F130A1B9E4CFDF1183D595EC0F46FBCD, xmp.iid:F230A1B9E4CFDF1183D595EC0F46FBCD, xmp.iid:28EDC7D5E6CFDF1183D595EC0F46FBCD, xmp.iid:2AEDC7D5E6CFDF1183D595EC0F46FBCD, xmp.iid:2CEDC7D5E6CFDF1183D595EC0F46FBCD, xmp.iid:2EEDC7D5E6CFDF1183D595EC0F46FBCD, xmp.iid:30EDC7D5E6CFDF1183D595EC0F46FBCD, xmp.iid:32EDC7D5E6CFDF1183D595EC0F46FBCD, xmp.iid:78994EF0E9CFDF1183D595EC0F46FBCD, xmp.iid:7A994EF0E9CFDF1183D595EC0F46FBCD, xmp.iid:7C994EF0E9CFDF1183D595EC0F46FBCD, xmp.iid:7E994EF0E9CFDF1183D595EC0F46FBCD, xmp.iid:80994EF0E9CFDF1183D595EC0F46FBCD, xmp.iid:B7D00119ECCFDF1183D595EC0F46FBCD, xmp.iid:B8D00119ECCFDF1183D595EC0F46FBCD, xmp.iid:BAD00119ECCFDF1183D595EC0F46FBCD, xmp.iid:BBD00119ECCFDF1183D595EC0F46FBCD, xmp.iid:BDD00119ECCFDF1183D595EC0F46FBCD, xmp.iid:BFD00119ECCFDF1183D595EC0F46FBCD, xmp.iid:C1D00119ECCFDF1183D595EC0F46FBCD, xmp.iid:AB69ADE1EECFDF1183D595EC0F46FBCD, xmp.iid:AD69ADE1EECFDF1183D595EC0F46FBCD, xmp.iid:AF69ADE1EECFDF1183D595EC0F46FBCD, xmp.iid:B169ADE1EECFDF1183D595EC0F46FBCD, xmp.iid:B369ADE1EECFDF1183D595EC0F46FBCD, xmp.iid:51D26F46F2CFDF1183D595EC0F46FBCD, xmp.iid:53D26F46F2CFDF1183D595EC0F46FBCD, xmp.iid:55D26F46F2CFDF1183D595EC0F46FBCD, xmp.iid:56D26F46F2CFDF1183D595EC0F46FBCD, xmp.iid:57D26F46F2CFDF1183D595EC0F46FBCD, xmp.iid:59D26F46F2CFDF1183D595EC0F46FBCD, xmp.iid:5AD26F46F2CFDF1183D595EC0F46FBCD, xmp.iid:D0DB4097F6CFDF1183D595EC0F46FBCD, xmp.iid:D2DB4097F6CFDF1183D595EC0F46FBCD, xmp.iid:D4DB4097F6CFDF1183D595EC0F46FBCD, xmp.iid:D6DB4097F6CFDF1183D595EC0F46FBCD, xmp.iid:D8DB4097F6CFDF1183D595EC0F46FBCD, xmp.iid:DADB4097F6CFDF1183D595EC0F46FBCD, xmp.iid:958F190481D0DF11A40AA31A0137E231, xmp.iid:978F190481D0DF11A40AA31A0137E231, xmp.iid:988F190481D0DF11A40AA31A0137E231, xmp.iid:9A8F190481D0DF11A40AA31A0137E231, xmp.iid:C593A586A5D0DF118413866B9DCF2D22, xmp.iid:C693A586A5D0DF118413866B9DCF2D22, xmp.iid:C893A586A5D0DF118413866B9DCF2D22, xmp.iid:C993A586A5D0DF118413866B9DCF2D22, xmp.iid:CB93A586A5D0DF118413866B9DCF2D22, xmp.iid:CD93A586A5D0DF118413866B9DCF2D22, xmp.iid:4E8EBA1AACD0DF118413866B9DCF2D22, xmp.iid:508EBA1AACD0DF118413866B9DCF2D22, xmp.iid:528EBA1AACD0DF118413866B9DCF2D22, xmp.iid:538EBA1AACD0DF118413866B9DCF2D22, xmp.iid:558EBA1AACD0DF118413866B9DCF2D22, xmp.iid:568EBA1AACD0DF118413866B9DCF2D22, xmp.iid:705C98DEB0D0DF118413866B9DCF2D22, xmp.iid:725C98DEB0D0DF118413866B9DCF2D22, xmp.iid:735C98DEB0D0DF118413866B9DCF2D22, xmp.iid:755C98DEB0D0DF118413866B9DCF2D22, xmp.iid:765C98DEB0D0DF118413866B9DCF2D22, xmp.iid:775C98DEB0D0DF118413866B9DCF2D22, xmp.iid:795C98DEB0D0DF118413866B9DCF2D22, xmp.iid:7A5C98DEB0D0DF118413866B9DCF2D22, xmp.iid:66EA2355B5D0DF118413866B9DCF2D22, xmp.iid:68EA2355B5D0DF118413866B9DCF2D22, xmp.iid:69EA2355B5D0DF118413866B9DCF2D22, xmp.iid:6BEA2355B5D0DF118413866B9DCF2D22, xmp.iid:6DEA2355B5D0DF118413866B9DCF2D22, xmp.iid:6FEA2355B5D0DF118413866B9DCF2D22, xmp.iid:A5E9E104BDD0DF118413866B9DCF2D22, xmp.iid:A7E9E104BDD0DF118413866B9DCF2D22, xmp.iid:A9E9E104BDD0DF118413866B9DCF2D22, xmp.iid:2FBFC9947DD1DF11BCEEF41165FF15C5, xmp.iid:EA4A26F861E7DF119402C9C1BAAC416F, xmp.iid:EC4A26F861E7DF119402C9C1BAAC416F, xmp.iid:EF476A239B93E011A2F4D46AE33FC86D, xmp.iid:F1476A239B93E011A2F4D46AE33FC86D, xmp.iid:F2476A239B93E011A2F4D46AE33FC86D, xmp.iid:F4476A239B93E011A2F4D46AE33FC86D, xmp.iid:F6476A239B93E011A2F4D46AE33FC86D, xmp.iid:5FB3815E8CD6E111A3A5F5923B6C9DBC, xmp.iid:61B3815E8CD6E111A3A5F5923B6C9DBC, xmp.iid:62B3815E8CD6E111A3A5F5923B6C9DBC, xmp.iid:64B3815E8CD6E111A3A5F5923B6C9DBC, xmp.iid:66B3815E8CD6E111A3A5F5923B6C9DBC, xmp.iid:68B3815E8CD6E111A3A5F5923B6C9DBC, xmp.iid:7679BCCB93D6E111A3A5F5923B6C9DBC, xmp.iid:7879BCCB93D6E111A3A5F5923B6C9DBC, xmp.iid:7A79BCCB93D6E111A3A5F5923B6C9DBC, xmp.iid:7C79BCCB93D6E111A3A5F5923B6C9DBC, xmp.iid:7E79BCCB93D6E111A3A5F5923B6C9DBC, xmp.iid:EECCFDC396D6E111A3A5F5923B6C9DBC, xmp.iid:F0CCFDC396D6E111A3A5F5923B6C9DBC, xmp.iid:F2CCFDC396D6E111A3A5F5923B6C9DBC, xmp.iid:F4CCFDC396D6E111A3A5F5923B6C9DBC, xmp.iid:F6CCFDC396D6E111A3A5F5923B6C9DBC, xmp.iid:F8CCFDC396D6E111A3A5F5923B6C9DBC, xmp.iid:58F6E8D89BD6E111A3A5F5923B6C9DBC, xmp.iid:5AF6E8D89BD6E111A3A5F5923B6C9DBC, xmp.iid:5CF6E8D89BD6E111A3A5F5923B6C9DBC, xmp.iid:5EF6E8D89BD6E111A3A5F5923B6C9DBC, xmp.iid:60F6E8D89BD6E111A3A5F5923B6C9DBC, xmp.iid:33B6416B9ED6E111A3A5F5923B6C9DBC, xmp.iid:35B6416B9ED6E111A3A5F5923B6C9DBC, xmp.iid:37B6416B9ED6E111A3A5F5923B6C9DBC, xmp.iid:39B6416B9ED6E111A3A5F5923B6C9DBC, xmp.iid:3BB6416B9ED6E111A3A5F5923B6C9DBC, xmp.iid:3DB6416B9ED6E111A3A5F5923B6C9DBC, xmp.iid:165A912BA0D6E111A3A5F5923B6C9DBC, xmp.iid:185A912BA0D6E111A3A5F5923B6C9DBC, xmp.iid:1A5A912BA0D6E111A3A5F5923B6C9DBC, xmp.iid:1C5A912BA0D6E111A3A5F5923B6C9DBC, xmp.iid:1E5A912BA0D6E111A3A5F5923B6C9DBC, xmp.iid:7F16110EA2D6E111A3A5F5923B6C9DBC, xmp.iid:8116110EA2D6E111A3A5F5923B6C9DBC, xmp.iid:8316110EA2D6E111A3A5F5923B6C9DBC, xmp.iid:8516110EA2D6E111A3A5F5923B6C9DBC, xmp.iid:8716110EA2D6E111A3A5F5923B6C9DBC, xmp.iid:8916110EA2D6E111A3A5F5923B6C9DBC, xmp.iid:FADDD1AE30D7E1118D5A8DDF3FD7C405, xmp.iid:FCDDD1AE30D7E1118D5A8DDF3FD7C405, xmp.iid:BC71853F37D7E111882C938B22552648, xmp.iid:BE71853F37D7E111882C938B22552648, xmp.iid:BF71853F37D7E111882C938B22552648, xmp.iid:C171853F37D7E111882C938B22552648, xmp.iid:C371853F37D7E111882C938B22552648, xmp.iid:C571853F37D7E111882C938B22552648, xmp.iid:987FB3D354D7E111882C938B22552648, xmp.iid:9A7FB3D354D7E111882C938B22552648, xmp.iid:9C7FB3D354D7E111882C938B22552648, xmp.iid:9E7FB3D354D7E111882C938B22552648, xmp.iid:9F7FB3D354D7E111882C938B22552648, xmp.iid:A17FB3D354D7E111882C938B22552648, xmp.iid:8D0B117B6BE5E111B6C992907B7269CF, xmp.iid:8F0B117B6BE5E111B6C992907B7269CF, xmp.iid:910B117B6BE5E111B6C992907B7269CF, xmp.iid:930B117B6BE5E111B6C992907B7269CF, xmp.iid:950B117B6BE5E111B6C992907B7269CF, xmp.iid:960B117B6BE5E111B6C992907B7269CF, xmp.iid:A12C999D1FE6E111B6C992907B7269CF, xmp.iid:A32C999D1FE6E111B6C992907B7269CF, xmp.iid:A52C999D1FE6E111B6C992907B7269CF, xmp.iid:A72C999D1FE6E111B6C992907B7269CF, xmp.iid:A92C999D1FE6E111B6C992907B7269CF, xmp.iid:4073DFCD24E6E111B6C992907B7269CF, xmp.iid:4273DFCD24E6E111B6C992907B7269CF, xmp.iid:4473DFCD24E6E111B6C992907B7269CF, xmp.iid:4573DFCD24E6E111B6C992907B7269CF, xmp.iid:4773DFCD24E6E111B6C992907B7269CF, xmp.iid:4973DFCD24E6E111B6C992907B7269CF, xmp.iid:F57DC4914AE6E111B6C992907B7269CF, xmp.iid:F77DC4914AE6E111B6C992907B7269CF, xmp.iid:F97DC4914AE6E111B6C992907B7269CF, xmp.iid:FB7DC4914AE6E111B6C992907B7269CF, xmp.iid:FD7DC4914AE6E111B6C992907B7269CF, xmp.iid:ED52BBA2EEE6E1119843C7B6B9493116, xmp.iid:EF52BBA2EEE6E1119843C7B6B9493116, xmp.iid:F152BBA2EEE6E1119843C7B6B9493116, xmp.iid:F352BBA2EEE6E1119843C7B6B9493116, xmp.iid:F552BBA2EEE6E1119843C7B6B9493116, xmp.iid:A39DB0DEF5E6E1119843C7B6B9493116, xmp.iid:A59DB0DEF5E6E1119843C7B6B9493116, xmp.iid:A69DB0DEF5E6E1119843C7B6B9493116, xmp.iid:A89DB0DEF5E6E1119843C7B6B9493116, xmp.iid:AA9DB0DEF5E6E1119843C7B6B9493116, xmp.iid:AC9DB0DEF5E6E1119843C7B6B9493116, xmp.iid:A65AA126F8E6E1119843C7B6B9493116, xmp.iid:A85AA126F8E6E1119843C7B6B9493116, xmp.iid:A95AA126F8E6E1119843C7B6B9493116, xmp.iid:AB5AA126F8E6E1119843C7B6B9493116, xmp.iid:AD5AA126F8E6E1119843C7B6B9493116, xmp.iid:AF5AA126F8E6E1119843C7B6B9493116, xmp.iid:A92CAC68FBE6E1119843C7B6B9493116, xmp.iid:AB2CAC68FBE6E1119843C7B6B9493116, xmp.iid:AD2CAC68FBE6E1119843C7B6B9493116, xmp.iid:AF2CAC68FBE6E1119843C7B6B9493116, xmp.iid:B12CAC68FBE6E1119843C7B6B9493116, xmp.iid:B32CAC68FBE6E1119843C7B6B9493116, xmp.iid:BFCEB10801E7E1119843C7B6B9493116, xmp.iid:C1CEB10801E7E1119843C7B6B9493116, xmp.iid:C3CEB10801E7E1119843C7B6B9493116, xmp.iid:C5CEB10801E7E1119843C7B6B9493116, xmp.iid:0ADC9C940CE7E1119843C7B6B9493116, xmp.iid:0CDC9C940CE7E1119843C7B6B9493116, xmp.iid:0EDC9C940CE7E1119843C7B6B9493116, xmp.iid:10DC9C940CE7E1119843C7B6B9493116, xmp.iid:12DC9C940CE7E1119843C7B6B9493116, xmp.iid:14DC9C940CE7E1119843C7B6B9493116, xmp.iid:AAB4B82810E7E1119843C7B6B9493116, xmp.iid:ACB4B82810E7E1119843C7B6B9493116, xmp.iid:AEB4B82810E7E1119843C7B6B9493116, xmp.iid:B0B4B82810E7E1119843C7B6B9493116, xmp.iid:B2B4B82810E7E1119843C7B6B9493116, xmp.iid:0D9AEA5C13E7E1119843C7B6B9493116, xmp.iid:0F9AEA5C13E7E1119843C7B6B9493116, xmp.iid:119AEA5C13E7E1119843C7B6B9493116, xmp.iid:139AEA5C13E7E1119843C7B6B9493116, xmp.iid:159AEA5C13E7E1119843C7B6B9493116, xmp.iid:179AEA5C13E7E1119843C7B6B9493116, xmp.iid:4118C92B15E7E1119843C7B6B9493116, xmp.iid:4318C92B15E7E1119843C7B6B9493116, xmp.iid:4518C92B15E7E1119843C7B6B9493116, xmp.iid:4718C92B15E7E1119843C7B6B9493116, xmp.iid:8A3FBC041FE7E1119843C7B6B9493116, xmp.iid:8C3FBC041FE7E1119843C7B6B9493116, xmp.iid:8E3FBC041FE7E1119843C7B6B9493116, xmp.iid:903FBC041FE7E1119843C7B6B9493116, xmp.iid:923FBC041FE7E1119843C7B6B9493116, xmp.iid:D1C76E02B9E7E1119E22ABCB24571011, xmp.iid:D3C76E02B9E7E1119E22ABCB24571011, xmp.iid:D5C76E02B9E7E1119E22ABCB24571011, xmp.iid:D7C76E02B9E7E1119E22ABCB24571011, xmp.iid:D9C76E02B9E7E1119E22ABCB24571011, xmp.iid:59B63F96C6E7E1119E22ABCB24571011, xmp.iid:5BB63F96C6E7E1119E22ABCB24571011, xmp.iid:5DB63F96C6E7E1119E22ABCB24571011, xmp.iid:5FB63F96C6E7E1119E22ABCB24571011, xmp.iid:61B63F96C6E7E1119E22ABCB24571011, xmp.iid:BAB62E2ACEE7E1119E22ABCB24571011, xmp.iid:BCB62E2ACEE7E1119E22ABCB24571011, xmp.iid:BEB62E2ACEE7E1119E22ABCB24571011, xmp.iid:C0B62E2ACEE7E1119E22ABCB24571011, xmp.iid:C2B62E2ACEE7E1119E22ABCB24571011, xmp.iid:C4B62E2ACEE7E1119E22ABCB24571011, xmp.iid:48C56DC8DEE7E1119E22ABCB24571011, xmp.iid:4AC56DC8DEE7E1119E22ABCB24571011, xmp.iid:577D900C7EE8E111AE56A2F708435743, xmp.iid:597D900C7EE8E111AE56A2F708435743, xmp.iid:970B95984FF8E1119DDCB4C52E40591F, xmp.iid:990B95984FF8E1119DDCB4C52E40591F, xmp.iid:9B0B95984FF8E1119DDCB4C52E40591F, xmp.iid:9D0B95984FF8E1119DDCB4C52E40591F, xmp.iid:9F0B95984FF8E1119DDCB4C52E40591F, xmp.iid:631A61B950F8E1119DDCB4C52E40591F, xmp.iid:651A61B950F8E1119DDCB4C52E40591F, xmp.iid:671A61B950F8E1119DDCB4C52E40591F, xmp.iid:A74DB8B862F8E1118EAE8E150ED7ADFE, xmp.iid:A94DB8B862F8E1118EAE8E150ED7ADFE, xmp.iid:AB4DB8B862F8E1118EAE8E150ED7ADFE, xmp.iid:1F167D3D6527E21180329FFEA56F72EF, xmp.iid:21167D3D6527E21180329FFEA56F72EF, xmp.iid:22167D3D6527E21180329FFEA56F72EF, xmp.iid:24167D3D6527E21180329FFEA56F72EF, xmp.iid:26167D3D6527E21180329FFEA56F72EF, xmp.iid:4DEB1C4F053BE211B5C0F32DA6320893, xmp.iid:4FEB1C4F053BE211B5C0F32DA6320893, xmp.iid:50EB1C4F053BE211B5C0F32DA6320893, xmp.iid:E8E998C0B759E211B514BC709FDF1C6C, xmp.iid:EAE998C0B759E211B514BC709FDF1C6C, xmp.iid:ECE998C0B759E211B514BC709FDF1C6C, xmp.iid:EEE998C0B759E211B514BC709FDF1C6C, xmp.iid:F0E998C0B759E211B514BC709FDF1C6C, xmp.iid:8E287BDCC059E211B514BC709FDF1C6C, xmp.iid:90287BDCC059E211B514BC709FDF1C6C, xmp.iid:92287BDCC059E211B514BC709FDF1C6C, xmp.iid:94287BDCC059E211B514BC709FDF1C6C, xmp.iid:96287BDCC059E211B514BC709FDF1C6C, xmp.iid:98287BDCC059E211B514BC709FDF1C6C, xmp.iid:AF752DF6C559E211B514BC709FDF1C6C, xmp.iid:B1752DF6C559E211B514BC709FDF1C6C, xmp.iid:B3752DF6C559E211B514BC709FDF1C6C, xmp.iid:B5752DF6C559E211B514BC709FDF1C6C, xmp.iid:B7752DF6C559E211B514BC709FDF1C6C, xmp.iid:1EE27286C759E211B514BC709FDF1C6C, xmp.iid:20E27286C759E211B514BC709FDF1C6C, xmp.iid:22E27286C759E211B514BC709FDF1C6C, xmp.iid:24E27286C759E211B514BC709FDF1C6C, xmp.iid:26E27286C759E211B514BC709FDF1C6C, xmp.iid:28E27286C759E211B514BC709FDF1C6C, xmp.iid:41F8C111C959E211B514BC709FDF1C6C, xmp.iid:43F8C111C959E211B514BC709FDF1C6C, xmp.iid:45F8C111C959E211B514BC709FDF1C6C, xmp.iid:47F8C111C959E211B514BC709FDF1C6C, xmp.iid:49F8C111C959E211B514BC709FDF1C6C, xmp.iid:5C82BA8ED459E211B514BC709FDF1C6C, xmp.iid:5E82BA8ED459E211B514BC709FDF1C6C, xmp.iid:6082BA8ED459E211B514BC709FDF1C6C, xmp.iid:6282BA8ED459E211B514BC709FDF1C6C, xmp.iid:6482BA8ED459E211B514BC709FDF1C6C, xmp.iid:6682BA8ED459E211B514BC709FDF1C6C, xmp.iid:7D5A97ECD859E211B514BC709FDF1C6C, xmp.iid:7F5A97ECD859E211B514BC709FDF1C6C, xmp.iid:815A97ECD859E211B514BC709FDF1C6C, xmp.iid:835A97ECD859E211B514BC709FDF1C6C, xmp.iid:855A97ECD859E211B514BC709FDF1C6C, xmp.iid:0D2FC4A0DA59E211B514BC709FDF1C6C, xmp.iid:0F2FC4A0DA59E211B514BC709FDF1C6C, xmp.iid:112FC4A0DA59E211B514BC709FDF1C6C, xmp.iid:132FC4A0DA59E211B514BC709FDF1C6C, xmp.iid:152FC4A0DA59E211B514BC709FDF1C6C, xmp.iid:172FC4A0DA59E211B514BC709FDF1C6C, xmp.iid:5D965F91E259E211B514BC709FDF1C6C, xmp.iid:1E41BC4D695AE21185E5A51914524A6D, xmp.iid:2041BC4D695AE21185E5A51914524A6D, xmp.iid:2141BC4D695AE21185E5A51914524A6D, xmp.iid:2341BC4D695AE21185E5A51914524A6D, xmp.iid:2541BC4D695AE21185E5A51914524A6D, xmp.iid:2741BC4D695AE21185E5A51914524A6D, xmp.iid:0DBA5891825AE21185E5A51914524A6D, xmp.iid:0FBA5891825AE21185E5A51914524A6D, xmp.iid:11BA5891825AE21185E5A51914524A6D, xmp.iid:13BA5891825AE21185E5A51914524A6D, xmp.iid:15BA5891825AE21185E5A51914524A6D, xmp.iid:70F57679985AE21185E5A51914524A6D, xmp.iid:72F57679985AE21185E5A51914524A6D, xmp.iid:74F57679985AE21185E5A51914524A6D, xmp.iid:76F57679985AE21185E5A51914524A6D, xmp.iid:78F57679985AE21185E5A51914524A6D, xmp.iid:7AF57679985AE21185E5A51914524A6D, xmp.iid:CB232D259B5AE21185E5A51914524A6D, xmp.iid:CD232D259B5AE21185E5A51914524A6D, xmp.iid:CF232D259B5AE21185E5A51914524A6D, xmp.iid:D1232D259B5AE21185E5A51914524A6D, xmp.iid:D3232D259B5AE21185E5A51914524A6D, xmp.iid:0A1011D49D5AE21185E5A51914524A6D, xmp.iid:7A506838445BE2119AD5D32788B71BDA, xmp.iid:7C506838445BE2119AD5D32788B71BDA, xmp.iid:7E506838445BE2119AD5D32788B71BDA, xmp.iid:80506838445BE2119AD5D32788B71BDA, xmp.iid:82506838445BE2119AD5D32788B71BDA, xmp.iid:5FE691884A5BE2119AD5D32788B71BDA, xmp.iid:61E691884A5BE2119AD5D32788B71BDA, xmp.iid:63E691884A5BE2119AD5D32788B71BDA, xmp.iid:65E691884A5BE2119AD5D32788B71BDA, xmp.iid:67E691884A5BE2119AD5D32788B71BDA, xmp.iid:9B3B3D884C5BE2119AD5D32788B71BDA, xmp.iid:9D3B3D884C5BE2119AD5D32788B71BDA, xmp.iid:9F3B3D884C5BE2119AD5D32788B71BDA, xmp.iid:A13B3D884C5BE2119AD5D32788B71BDA, xmp.iid:A33B3D884C5BE2119AD5D32788B71BDA, xmp.iid:A53B3D884C5BE2119AD5D32788B71BDA, xmp.iid:D5E5A8114F5BE2119AD5D32788B71BDA, xmp.iid:D6E5A8114F5BE2119AD5D32788B71BDA, xmp.iid:D8E5A8114F5BE2119AD5D32788B71BDA, xmp.iid:5B57D7E06C5BE2119284F3ED82287140, xmp.iid:5D57D7E06C5BE2119284F3ED82287140, xmp.iid:5F57D7E06C5BE2119284F3ED82287140, xmp.iid:6057D7E06C5BE2119284F3ED82287140, xmp.iid:6257D7E06C5BE2119284F3ED82287140, xmp.iid:6457D7E06C5BE2119284F3ED82287140, xmp.iid:E568ECF26E5BE2119284F3ED82287140, xmp.iid:E768ECF26E5BE2119284F3ED82287140, xmp.iid:E968ECF26E5BE2119284F3ED82287140, xmp.iid:EB68ECF26E5BE2119284F3ED82287140, xmp.iid:ED68ECF26E5BE2119284F3ED82287140, xmp.iid:FBDD12BB705BE2119284F3ED82287140, xmp.iid:FDDD12BB705BE2119284F3ED82287140, xmp.iid:FFDD12BB705BE2119284F3ED82287140, xmp.iid:01DE12BB705BE2119284F3ED82287140, xmp.iid:03DE12BB705BE2119284F3ED82287140, xmp.iid:05DE12BB705BE2119284F3ED82287140, xmp.iid:FB54FF56735BE2119284F3ED82287140, xmp.iid:FD54FF56735BE2119284F3ED82287140, xmp.iid:FF54FF56735BE2119284F3ED82287140, xmp.iid:0155FF56735BE2119284F3ED82287140, xmp.iid:0355FF56735BE2119284F3ED82287140, xmp.iid:12F01A4E765BE2119284F3ED82287140, xmp.iid:0D245585015CE2118CA9F6C310E63151, xmp.iid:0F245585015CE2118CA9F6C310E63151, xmp.iid:10245585015CE2118CA9F6C310E63151, xmp.iid:12245585015CE2118CA9F6C310E63151, xmp.iid:14245585015CE2118CA9F6C310E63151, xmp.iid:16245585015CE2118CA9F6C310E63151, xmp.iid:2DD51AB80D5CE2118CA9F6C310E63151, xmp.iid:2FD51AB80D5CE2118CA9F6C310E63151, xmp.iid:31D51AB80D5CE2118CA9F6C310E63151, xmp.iid:33D51AB80D5CE2118CA9F6C310E63151, xmp.iid:34D51AB80D5CE2118CA9F6C310E63151, xmp.iid:36D51AB80D5CE2118CA9F6C310E63151, xmp.iid:DD88CE66165CE2118CA9F6C310E63151, xmp.iid:DE88CE66165CE2118CA9F6C310E63151, xmp.iid:DF88CE66165CE2118CA9F6C310E63151, xmp.iid:E188CE66165CE2118CA9F6C310E63151, xmp.iid:E388CE66165CE2118CA9F6C310E63151, xmp.iid:22267BE7675EE211986F8E535D9AD1AF, xmp.iid:24267BE7675EE211986F8E535D9AD1AF, xmp.iid:26267BE7675EE211986F8E535D9AD1AF, xmp.iid:28267BE7675EE211986F8E535D9AD1AF, xmp.iid:2A267BE7675EE211986F8E535D9AD1AF, xmp.iid:2583C0AB8C5EE211986F8E535D9AD1AF, xmp.iid:2783C0AB8C5EE211986F8E535D9AD1AF, xmp.iid:2983C0AB8C5EE211986F8E535D9AD1AF, xmp.iid:2B83C0AB8C5EE211986F8E535D9AD1AF, xmp.iid:2D83C0AB8C5EE211986F8E535D9AD1AF, xmp.iid:6926418E905EE211986F8E535D9AD1AF, xmp.iid:6B26418E905EE211986F8E535D9AD1AF, xmp.iid:6D26418E905EE211986F8E535D9AD1AF, xmp.iid:6F26418E905EE211986F8E535D9AD1AF, xmp.iid:7126418E905EE211986F8E535D9AD1AF, xmp.iid:7326418E905EE211986F8E535D9AD1AF, xmp.iid:ED0CAF5B995EE211986F8E535D9AD1AF, xmp.iid:EF0CAF5B995EE211986F8E535D9AD1AF, xmp.iid:9227099C2A5FE2119B6E9379AB3F3402, xmp.iid:9427099C2A5FE2119B6E9379AB3F3402, xmp.iid:9527099C2A5FE2119B6E9379AB3F3402, xmp.iid:9727099C2A5FE2119B6E9379AB3F3402, xmp.iid:9927099C2A5FE2119B6E9379AB3F3402, xmp.iid:9B27099C2A5FE2119B6E9379AB3F3402, xmp.iid:A29511FB2D5FE2119B6E9379AB3F3402, xmp.iid:A49511FB2D5FE2119B6E9379AB3F3402, xmp.iid:A69511FB2D5FE2119B6E9379AB3F3402, xmp.iid:A89511FB2D5FE2119B6E9379AB3F3402, xmp.iid:AA9511FB2D5FE2119B6E9379AB3F3402, xmp.iid:F52A23122F5FE2119B6E9379AB3F3402, xmp.iid:F72A23122F5FE2119B6E9379AB3F3402, xmp.iid:F92A23122F5FE2119B6E9379AB3F3402, xmp.iid:FB2A23122F5FE2119B6E9379AB3F3402, xmp.iid:FD2A23122F5FE2119B6E9379AB3F3402, xmp.iid:FF2A23122F5FE2119B6E9379AB3F3402, xmp.iid:68F361D42F5FE2119B6E9379AB3F3402, xmp.iid:6AF361D42F5FE2119B6E9379AB3F3402, xmp.iid:6CF361D42F5FE2119B6E9379AB3F3402, xmp.iid:6EF361D42F5FE2119B6E9379AB3F3402, xmp.iid:70F361D42F5FE2119B6E9379AB3F3402, xmp.iid:71F361D42F5FE2119B6E9379AB3F3402, xmp.iid:772A4C97345FE2119B6E9379AB3F3402, xmp.iid:782A4C97345FE2119B6E9379AB3F3402, xmp.iid:792A4C97345FE2119B6E9379AB3F3402, xmp.iid:7B2A4C97345FE2119B6E9379AB3F3402, xmp.iid:7D2A4C97345FE2119B6E9379AB3F3402, xmp.iid:7F2A4C97345FE2119B6E9379AB3F3402, xmp.iid:CEA7C5F1485FE2119B6E9379AB3F3402, xmp.iid:D0A7C5F1485FE2119B6E9379AB3F3402, xmp.iid:D2A7C5F1485FE2119B6E9379AB3F3402, xmp.iid:D4A7C5F1485FE2119B6E9379AB3F3402, xmp.iid:D6A7C5F1485FE2119B6E9379AB3F3402, xmp.iid:D8A7C5F1485FE2119B6E9379AB3F3402, xmp.iid:49BE4EAD555FE2119B6E9379AB3F3402, xmp.iid:4BBE4EAD555FE2119B6E9379AB3F3402, xmp.iid:4DBE4EAD555FE2119B6E9379AB3F3402, xmp.iid:4FBE4EAD555FE2119B6E9379AB3F3402, xmp.iid:0B1953C30060E2119E329C58132C1437, xmp.iid:0D1953C30060E2119E329C58132C1437, xmp.iid:0F1953C30060E2119E329C58132C1437, xmp.iid:111953C30060E2119E329C58132C1437, xmp.iid:9F6829821B60E2119E329C58132C1437, xmp.iid:A16829821B60E2119E329C58132C1437, xmp.iid:A36829821B60E2119E329C58132C1437, xmp.iid:A56829821B60E2119E329C58132C1437, xmp.iid:19A26BD6BF60E2119D1BB3E8E22F6571, xmp.iid:1BA26BD6BF60E2119D1BB3E8E22F6571, xmp.iid:1CA26BD6BF60E2119D1BB3E8E22F6571, xmp.iid:1EA26BD6BF60E2119D1BB3E8E22F6571, xmp.iid:20A26BD6BF60E2119D1BB3E8E22F6571, xmp.iid:91CDBBAB5466E21189BB9E067F0AFDF8, xmp.iid:93CDBBAB5466E21189BB9E067F0AFDF8, xmp.iid:95CDBBAB5466E21189BB9E067F0AFDF8, xmp.iid:97CDBBAB5466E21189BB9E067F0AFDF8, xmp.iid:99CDBBAB5466E21189BB9E067F0AFDF8, xmp.iid:EE1BF29A6466E21189BB9E067F0AFDF8, xmp.iid:F01BF29A6466E21189BB9E067F0AFDF8, xmp.iid:F21BF29A6466E21189BB9E067F0AFDF8, xmp.iid:F41BF29A6466E21189BB9E067F0AFDF8, xmp.iid:F61BF29A6466E21189BB9E067F0AFDF8, xmp.iid:F81BF29A6466E21189BB9E067F0AFDF8, xmp.iid:F745A512D88CE211BBC2FBEEFA0ED0D9, xmp.iid:F945A512D88CE211BBC2FBEEFA0ED0D9, xmp.iid:FB45A512D88CE211BBC2FBEEFA0ED0D9, xmp.iid:FD45A512D88CE211BBC2FBEEFA0ED0D9, xmp.iid:FF45A512D88CE211BBC2FBEEFA0ED0D9, xmp.iid:86911BCFDC8CE211BBC2FBEEFA0ED0D9, xmp.iid:88911BCFDC8CE211BBC2FBEEFA0ED0D9, xmp.iid:8A911BCFDC8CE211BBC2FBEEFA0ED0D9, xmp.iid:8C911BCFDC8CE211BBC2FBEEFA0ED0D9, xmp.iid:8E911BCFDC8CE211BBC2FBEEFA0ED0D9, xmp.iid:90911BCFDC8CE211BBC2FBEEFA0ED0D9, xmp.iid:DBCBADAEE38CE211BBC2FBEEFA0ED0D9, xmp.iid:284A81C07A8DE211807BEC045479FEBE, xmp.iid:2A4A81C07A8DE211807BEC045479FEBE, xmp.iid:2C4A81C07A8DE211807BEC045479FEBE, xmp.iid:2E4A81C07A8DE211807BEC045479FEBE, xmp.iid:304A81C07A8DE211807BEC045479FEBE, xmp.iid:9F055A4B818DE211807BEC045479FEBE, xmp.iid:A1055A4B818DE211807BEC045479FEBE, xmp.iid:A3055A4B818DE211807BEC045479FEBE, xmp.iid:A5055A4B818DE211807BEC045479FEBE, xmp.iid:A7055A4B818DE211807BEC045479FEBE, xmp.iid:10BF10BF8F8DE211807BEC045479FEBE, xmp.iid:14BF10BF8F8DE211807BEC045479FEBE, xmp.iid:16BF10BF8F8DE211807BEC045479FEBE, xmp.iid:18BF10BF8F8DE211807BEC045479FEBE, xmp.iid:1ABF10BF8F8DE211807BEC045479FEBE, xmp.iid:E6084908918DE211807BEC045479FEBE, xmp.iid:E8084908918DE211807BEC045479FEBE, xmp.iid:E9084908918DE211807BEC045479FEBE, xmp.iid:EB084908918DE211807BEC045479FEBE, xmp.iid:EC084908918DE211807BEC045479FEBE, xmp.iid:EE084908918DE211807BEC045479FEBE, xmp.iid:3CB7C8DC9E8DE211807BEC045479FEBE, xmp.iid:3EB7C8DC9E8DE211807BEC045479FEBE, xmp.iid:40B7C8DC9E8DE211807BEC045479FEBE, xmp.iid:42B7C8DC9E8DE211807BEC045479FEBE, xmp.iid:5CDEFB40A38DE211AC9EB5380C793263, xmp.iid:5EDEFB40A38DE211AC9EB5380C793263, xmp.iid:5FDEFB40A38DE211AC9EB5380C793263, xmp.iid:61DEFB40A38DE211AC9EB5380C793263, xmp.iid:63DEFB40A38DE211AC9EB5380C793263, xmp.iid:65DEFB40A38DE211AC9EB5380C793263, xmp.iid:9508E1D2A98DE211AC9EB5380C793263, xmp.iid:9708E1D2A98DE211AC9EB5380C793263, xmp.iid:9908E1D2A98DE211AC9EB5380C793263, xmp.iid:9B08E1D2A98DE211AC9EB5380C793263, xmp.iid:9D08E1D2A98DE211AC9EB5380C793263, xmp.iid:65CB46A0AB8DE211AC9EB5380C793263, xmp.iid:67CB46A0AB8DE211AC9EB5380C793263, xmp.iid:69CB46A0AB8DE211AC9EB5380C793263, xmp.iid:6BCB46A0AB8DE211AC9EB5380C793263, xmp.iid:6DCB46A0AB8DE211AC9EB5380C793263, xmp.iid:6FCB46A0AB8DE211AC9EB5380C793263, xmp.iid:88A0E769AF8DE211AC9EB5380C793263, xmp.iid:8AA0E769AF8DE211AC9EB5380C793263, xmp.iid:8CA0E769AF8DE211AC9EB5380C793263, xmp.iid:8EA0E769AF8DE211AC9EB5380C793263, xmp.iid:90A0E769AF8DE211AC9EB5380C793263, xmp.iid:2D4D52FCB48DE211AC9EB5380C793263, xmp.iid:2F4D52FCB48DE211AC9EB5380C793263, xmp.iid:D2AC98C5C890E211B00D80AAD550ADF5, xmp.iid:D4AC98C5C890E211B00D80AAD550ADF5, xmp.iid:D6AC98C5C890E211B00D80AAD550ADF5, xmp.iid:D8AC98C5C890E211B00D80AAD550ADF5, xmp.iid:DAAC98C5C890E211B00D80AAD550ADF5, xmp.iid:04966F97D090E211B00D80AAD550ADF5, xmp.iid:06966F97D090E211B00D80AAD550ADF5, xmp.iid:0A966F97D090E211B00D80AAD550ADF5, xmp.iid:0C966F97D090E211B00D80AAD550ADF5, xmp.iid:8EDD18691293E211A552F8C9FA98E969, xmp.iid:90DD18691293E211A552F8C9FA98E969, xmp.iid:92DD18691293E211A552F8C9FA98E969, xmp.iid:94DD18691293E211A552F8C9FA98E969, xmp.iid:95DD18691293E211A552F8C9FA98E969, xmp.iid:97CA99DC1793E211A552F8C9FA98E969, xmp.iid:98CA99DC1793E211A552F8C9FA98E969, xmp.iid:9ACA99DC1793E211A552F8C9FA98E969, xmp.iid:9CCA99DC1793E211A552F8C9FA98E969, xmp.iid:9ECA99DC1793E211A552F8C9FA98E969, xmp.iid:A0CA99DC1793E211A552F8C9FA98E969, xmp.iid:3C8E64772293E211A552F8C9FA98E969, xmp.iid:3E8E64772293E211A552F8C9FA98E969, xmp.iid:408E64772293E211A552F8C9FA98E969, xmp.iid:418E64772293E211A552F8C9FA98E969, xmp.iid:438E64772293E211A552F8C9FA98E969, xmp.iid:448E64772293E211A552F8C9FA98E969, xmp.iid:468E64772293E211A552F8C9FA98E969, xmp.iid:B8CA15FD2A93E211A552F8C9FA98E969, xmp.iid:BACA15FD2A93E211A552F8C9FA98E969, xmp.iid:BCCA15FD2A93E211A552F8C9FA98E969, xmp.iid:BECA15FD2A93E211A552F8C9FA98E969, xmp.iid:C0CA15FD2A93E211A552F8C9FA98E969, xmp.iid:6AEAB5223293E211A552F8C9FA98E969, xmp.iid:6CEAB5223293E211A552F8C9FA98E969, xmp.iid:6EEAB5223293E211A552F8C9FA98E969, xmp.iid:70EAB5223293E211A552F8C9FA98E969, xmp.iid:72EAB5223293E211A552F8C9FA98E969, xmp.iid:74EAB5223293E211A552F8C9FA98E969, xmp.iid:16EA81E33493E211A552F8C9FA98E969, xmp.iid:B245380E6E95E211A6DC9AFC99C8867E, xmp.iid:B445380E6E95E211A6DC9AFC99C8867E, xmp.iid:B645380E6E95E211A6DC9AFC99C8867E, xmp.iid:B845380E6E95E211A6DC9AFC99C8867E, xmp.iid:BA45380E6E95E211A6DC9AFC99C8867E, xmp.iid:6D551D548695E211A6DC9AFC99C8867E, xmp.iid:6F551D548695E211A6DC9AFC99C8867E, xmp.iid:71551D548695E211A6DC9AFC99C8867E, xmp.iid:784494973C96E21187DFEF164AA02741, xmp.iid:7A4494973C96E21187DFEF164AA02741, xmp.iid:7C4494973C96E21187DFEF164AA02741, xmp.iid:7E4494973C96E21187DFEF164AA02741, xmp.iid:804494973C96E21187DFEF164AA02741, xmp.iid:3315109E3D96E21187DFEF164AA02741, xmp.iid:D7AB3C040197E2119D10B8303804C946, xmp.iid:D9AB3C040197E2119D10B8303804C946, xmp.iid:DBAB3C040197E2119D10B8303804C946, xmp.iid:DDAB3C040197E2119D10B8303804C946, xmp.iid:DFAB3C040197E2119D10B8303804C946, xmp.iid:22C15C290A97E2119D10B8303804C946, xmp.iid:24C15C290A97E2119D10B8303804C946, xmp.iid:26C15C290A97E2119D10B8303804C946, xmp.iid:28C15C290A97E2119D10B8303804C946, xmp.iid:2AC15C290A97E2119D10B8303804C946, xmp.iid:2CC15C290A97E2119D10B8303804C946, xmp.iid:3A470EF91B97E2119D10B8303804C946, xmp.iid:3C470EF91B97E2119D10B8303804C946, xmp.iid:3E470EF91B97E2119D10B8303804C946, xmp.iid:40470EF91B97E2119D10B8303804C946, xmp.iid:42470EF91B97E2119D10B8303804C946, xmp.iid:C3508BB11D97E2119D10B8303804C946, xmp.iid:C5508BB11D97E2119D10B8303804C946, xmp.iid:C7508BB11D97E2119D10B8303804C946, xmp.iid:C9508BB11D97E2119D10B8303804C946, xmp.iid:CB508BB11D97E2119D10B8303804C946, xmp.iid:2AFEC491AF97E211B739F8E3C5304ED1, xmp.iid:2BFEC491AF97E211B739F8E3C5304ED1, xmp.iid:2DFEC491AF97E211B739F8E3C5304ED1, xmp.iid:2FFEC491AF97E211B739F8E3C5304ED1, xmp.iid:31FEC491AF97E211B739F8E3C5304ED1, xmp.iid:898B2769C297E211B739F8E3C5304ED1, xmp.iid:8B8B2769C297E211B739F8E3C5304ED1, xmp.iid:8D8B2769C297E211B739F8E3C5304ED1, xmp.iid:8F8B2769C297E211B739F8E3C5304ED1, xmp.iid:918B2769C297E211B739F8E3C5304ED1, xmp.iid:938B2769C297E211B739F8E3C5304ED1, xmp.iid:A1E2E478CC97E211B739F8E3C5304ED1, xmp.iid:A2E2E478CC97E211B739F8E3C5304ED1, xmp.iid:A4E2E478CC97E211B739F8E3C5304ED1, xmp.iid:A5E2E478CC97E211B739F8E3C5304ED1, xmp.iid:A7E2E478CC97E211B739F8E3C5304ED1, xmp.iid:A9E2E478CC97E211B739F8E3C5304ED1, xmp.iid:29EBF2C5D297E211B739F8E3C5304ED1, xmp.iid:2BEBF2C5D297E211B739F8E3C5304ED1, xmp.iid:2DEBF2C5D297E211B739F8E3C5304ED1, xmp.iid:2EEBF2C5D297E211B739F8E3C5304ED1, xmp.iid:30EBF2C5D297E211B739F8E3C5304ED1, xmp.iid:32EBF2C5D297E211B739F8E3C5304ED1, xmp.iid:33EBF2C5D297E211B739F8E3C5304ED1, xmp.iid:4259700CD897E211B739F8E3C5304ED1, xmp.iid:4459700CD897E211B739F8E3C5304ED1, xmp.iid:4659700CD897E211B739F8E3C5304ED1, xmp.iid:4859700CD897E211B739F8E3C5304ED1, xmp.iid:4A59700CD897E211B739F8E3C5304ED1, xmp.iid:A0BE983CDB97E211B739F8E3C5304ED1, xmp.iid:A2BE983CDB97E211B739F8E3C5304ED1, xmp.iid:A4BE983CDB97E211B739F8E3C5304ED1, xmp.iid:A6BE983CDB97E211B739F8E3C5304ED1, xmp.iid:2734FA0ADE97E2118999998295F26748, xmp.iid:2934FA0ADE97E2118999998295F26748, xmp.iid:2A34FA0ADE97E2118999998295F26748, xmp.iid:2B34FA0ADE97E2118999998295F26748, xmp.iid:2C34FA0ADE97E2118999998295F26748, xmp.iid:2D34FA0ADE97E2118999998295F26748, xmp.iid:2E34FA0ADE97E2118999998295F26748, xmp.iid:2F34FA0ADE97E2118999998295F26748, xmp.iid:C98CBE48E097E2118999998295F26748, xmp.iid:CB8CBE48E097E2118999998295F26748, xmp.iid:CD8CBE48E097E2118999998295F26748, xmp.iid:CF8CBE48E097E2118999998295F26748, xmp.iid:D18CBE48E097E2118999998295F26748, xmp.iid:D28CBE48E097E2118999998295F26748, xmp.iid:C9CA22E1EE97E2118999998295F26748, xmp.iid:CACA22E1EE97E2118999998295F26748, xmp.iid:CCCA22E1EE97E2118999998295F26748, xmp.iid:CECA22E1EE97E2118999998295F26748, xmp.iid:D0CA22E1EE97E2118999998295F26748, xmp.iid:D2CA22E1EE97E2118999998295F26748, xmp.iid:B315203FA298E2118999998295F26748, xmp.iid:B515203FA298E2118999998295F26748, xmp.iid:B715203FA298E2118999998295F26748, xmp.iid:B915203FA298E2118999998295F26748, xmp.iid:BB15203FA298E2118999998295F26748, xmp.iid:BC15203FA298E2118999998295F26748, xmp.iid:597D078CA898E2118999998295F26748, xmp.iid:5B7D078CA898E2118999998295F26748, xmp.iid:5D7D078CA898E2118999998295F26748, xmp.iid:5F7D078CA898E2118999998295F26748, xmp.iid:617D078CA898E2118999998295F26748, xmp.iid:637D078CA898E2118999998295F26748, xmp.iid:43068E26AC98E2118999998295F26748, xmp.iid:45068E26AC98E2118999998295F26748, xmp.iid:47068E26AC98E2118999998295F26748, xmp.iid:55E78586D99AE211AA37EEEAC42AD1CF, xmp.iid:57E78586D99AE211AA37EEEAC42AD1CF, xmp.iid:59E78586D99AE211AA37EEEAC42AD1CF, xmp.iid:5BE78586D99AE211AA37EEEAC42AD1CF, xmp.iid:5DE78586D99AE211AA37EEEAC42AD1CF, xmp.iid:59A959D1F79AE211AA37EEEAC42AD1CF, xmp.iid:5BA959D1F79AE211AA37EEEAC42AD1CF, xmp.iid:5DA959D1F79AE211AA37EEEAC42AD1CF, xmp.iid:5FA959D1F79AE211AA37EEEAC42AD1CF, xmp.iid:61A959D1F79AE211AA37EEEAC42AD1CF, xmp.iid:EC5F6067F99AE211AA37EEEAC42AD1CF, xmp.iid:ED5F6067F99AE211AA37EEEAC42AD1CF, xmp.iid:EF5F6067F99AE211AA37EEEAC42AD1CF, xmp.iid:F15F6067F99AE211AA37EEEAC42AD1CF, xmp.iid:F35F6067F99AE211AA37EEEAC42AD1CF, xmp.iid:F55F6067F99AE211AA37EEEAC42AD1CF, xmp.iid:2B3011F3FC9AE211AA37EEEAC42AD1CF, xmp.iid:2D3011F3FC9AE211AA37EEEAC42AD1CF, xmp.iid:2F3011F3FC9AE211AA37EEEAC42AD1CF, xmp.iid:303011F3FC9AE211AA37EEEAC42AD1CF, xmp.iid:313011F3FC9AE211AA37EEEAC42AD1CF, xmp.iid:333011F3FC9AE211AA37EEEAC42AD1CF, xmp.iid:353011F3FC9AE211AA37EEEAC42AD1CF, xmp.iid:307F4D32009BE211AA37EEEAC42AD1CF, xmp.iid:327F4D32009BE211AA37EEEAC42AD1CF, xmp.iid:347F4D32009BE211AA37EEEAC42AD1CF, xmp.iid:367F4D32009BE211AA37EEEAC42AD1CF, xmp.iid:387F4D32009BE211AA37EEEAC42AD1CF, xmp.iid:3133A2F3069BE211AA37EEEAC42AD1CF, xmp.iid:3333A2F3069BE211AA37EEEAC42AD1CF, xmp.iid:3533A2F3069BE211AA37EEEAC42AD1CF, xmp.iid:3733A2F3069BE211AA37EEEAC42AD1CF, xmp.iid:3933A2F3069BE211AA37EEEAC42AD1CF, xmp.iid:3B33A2F3069BE211AA37EEEAC42AD1CF, xmp.iid:9EA2A61C099BE211AA37EEEAC42AD1CF, xmp.iid:A0A2A61C099BE211AA37EEEAC42AD1CF, xmp.iid:A2A2A61C099BE211AA37EEEAC42AD1CF, xmp.iid:A4A2A61C099BE211AA37EEEAC42AD1CF, xmp.iid:A6A2A61C099BE211AA37EEEAC42AD1CF, xmp.iid:9C7C9B1D109BE211AA37EEEAC42AD1CF, xmp.iid:9D7C9B1D109BE211AA37EEEAC42AD1CF, xmp.iid:9F7C9B1D109BE211AA37EEEAC42AD1CF, xmp.iid:A07C9B1D109BE211AA37EEEAC42AD1CF, xmp.iid:A27C9B1D109BE211AA37EEEAC42AD1CF, xmp.iid:A47C9B1D109BE211AA37EEEAC42AD1CF, xmp.iid:A67C9B1D109BE211AA37EEEAC42AD1CF, xmp.iid:AB8D51F5139BE211AA37EEEAC42AD1CF, xmp.iid:AD8D51F5139BE211AA37EEEAC42AD1CF, xmp.iid:AF8D51F5139BE211AA37EEEAC42AD1CF, xmp.iid:B08D51F5139BE211AA37EEEAC42AD1CF, xmp.iid:B28D51F5139BE211AA37EEEAC42AD1CF, xmp.iid:B48D51F5139BE211AA37EEEAC42AD1CF, xmp.iid:7DAC7958A49BE21195A193728D00BF17, xmp.iid:7FAC7958A49BE21195A193728D00BF17, xmp.iid:81AC7958A49BE21195A193728D00BF17, xmp.iid:85AC7958A49BE21195A193728D00BF17, xmp.iid:43E19B01B39BE21195A193728D00BF17, xmp.iid:45E19B01B39BE21195A193728D00BF17, xmp.iid:47E19B01B39BE21195A193728D00BF17, xmp.iid:49E19B01B39BE21195A193728D00BF17, xmp.iid:4AE19B01B39BE21195A193728D00BF17, xmp.iid:4CE19B01B39BE21195A193728D00BF17, xmp.iid:DDE21314B99BE21195A193728D00BF17, xmp.iid:DFE21314B99BE21195A193728D00BF17, xmp.iid:E1E21314B99BE21195A193728D00BF17, xmp.iid:E3E21314B99BE21195A193728D00BF17, xmp.iid:E5E21314B99BE21195A193728D00BF17, xmp.iid:E7E21314B99BE21195A193728D00BF17, xmp.iid:BD9690C9BB9BE21195A193728D00BF17, xmp.iid:BF9690C9BB9BE21195A193728D00BF17, xmp.iid:C19690C9BB9BE21195A193728D00BF17, xmp.iid:C29690C9BB9BE21195A193728D00BF17, xmp.iid:C49690C9BB9BE21195A193728D00BF17, xmp.iid:E46AC146C29BE21195A193728D00BF17, xmp.iid:E66AC146C29BE21195A193728D00BF17, xmp.iid:E86AC146C29BE21195A193728D00BF17, xmp.iid:EA6AC146C29BE21195A193728D00BF17, xmp.iid:EC6AC146C29BE21195A193728D00BF17, xmp.iid:F8CB8400949CE2119D42C5847C3A6D50, xmp.iid:F9CB8400949CE2119D42C5847C3A6D50, xmp.iid:FBCB8400949CE2119D42C5847C3A6D50, xmp.iid:FDCB8400949CE2119D42C5847C3A6D50, xmp.iid:FFCB8400949CE2119D42C5847C3A6D50, xmp.iid:F0B01E340A9EE211A2DCF5370B3AE845, xmp.iid:F2B01E340A9EE211A2DCF5370B3AE845, xmp.iid:F4B01E340A9EE211A2DCF5370B3AE845, xmp.iid:C2227E4565A0E211A3158CB5CA88EC86, xmp.iid:C4227E4565A0E211A3158CB5CA88EC86, xmp.iid:C5227E4565A0E211A3158CB5CA88EC86, xmp.iid:C7227E4565A0E211A3158CB5CA88EC86, xmp.iid:C9227E4565A0E211A3158CB5CA88EC86, xmp.iid:CB227E4565A0E211A3158CB5CA88EC86, xmp.iid:C2EB99B469A0E211A3158CB5CA88EC86, xmp.iid:C4EB99B469A0E211A3158CB5CA88EC86, xmp.iid:C6EB99B469A0E211A3158CB5CA88EC86, xmp.iid:C8EB99B469A0E211A3158CB5CA88EC86, xmp.iid:CAEB99B469A0E211A3158CB5CA88EC86, xmp.iid:E87B85366CA0E211A3158CB5CA88EC86, xmp.iid:EA7B85366CA0E211A3158CB5CA88EC86, xmp.iid:EC7B85366CA0E211A3158CB5CA88EC86, xmp.iid:EE7B85366CA0E211A3158CB5CA88EC86, xmp.iid:F07B85366CA0E211A3158CB5CA88EC86, xmp.iid:F27B85366CA0E211A3158CB5CA88EC86, xmp.iid:466465CC6DA0E211A3158CB5CA88EC86, xmp.iid:486465CC6DA0E211A3158CB5CA88EC86, xmp.iid:4A6465CC6DA0E211A3158CB5CA88EC86, xmp.iid:4C6465CC6DA0E211A3158CB5CA88EC86, xmp.iid:4E6465CC6DA0E211A3158CB5CA88EC86, xmp.iid:145D0A7777A0E211A3158CB5CA88EC86, xmp.iid:165D0A7777A0E211A3158CB5CA88EC86, xmp.iid:185D0A7777A0E211A3158CB5CA88EC86, xmp.iid:1A5D0A7777A0E211A3158CB5CA88EC86, xmp.iid:1C5D0A7777A0E211A3158CB5CA88EC86, xmp.iid:1E5D0A7777A0E211A3158CB5CA88EC86, xmp.iid:A40B0E9C7CA0E211A3158CB5CA88EC86, xmp.iid:A60B0E9C7CA0E211A3158CB5CA88EC86, xmp.iid:A80B0E9C7CA0E211A3158CB5CA88EC86, xmp.iid:12B5054649A1E2119CA2F319178CDB59, xmp.iid:14B5054649A1E2119CA2F319178CDB59 History When : 2010:07:15 09:43:45-04:00, 2010:07:15 09:43:45-04:00, 2010:07:15 15:33:19-04:00, 2010:07:15 15:38:40-04:00, 2010:07:15 15:40:51-04:00, 2010:07:15 15:59:09-04:00, 2010:07:15 16:00:33-04:00, 2010:07:15 16:03:50-04:00, 2010:07:15 16:12:38-04:00, 2010:07:15 16:12:38-04:00, 2010:07:15 17:09:22-04:00, 2010:07:15 17:40:12-04:00, 2010:07:15 17:56:06-04:00, 2010:07:15 17:57:44-04:00, 2010:07:15 17:58:51-04:00, 2010:07:15 18:03:03-04:00, 2010:07:16 12:45:03-04:00, 2010:07:16 16:36:04-04:00, 2010:07:19 11:13:15-04:00, 2010:07:19 11:13:15-04:00, 2010:07:19 11:16:09-04:00, 2010:07:19 12:10:47-04:00, 2010:07:19 12:46:06-04:00, 2010:07:19 13:14:32-04:00, 2010:07:19 13:22:15-04:00, 2010:07:19 16:35:34-04:00, 2010:07:19 17:08:11-04:00, 2010:07:19 17:11:57-04:00, 2010:07:19 17:13:26-04:00, 2010:07:19 17:57:39-04:00, 2010:07:20 17:18:25-04:00, 2010:07:20 17:29:52-04:00, 2010:07:22 15:34:07-04:00, 2010:07:22 17:27:20-04:00, 2010:07:22 17:31:06-04:00, 2010:07:22 17:34:22-04:00, 2010:07:22 17:37:23-04:00, 2010:07:22 18:06:31-04:00, 2010:07:23 11:11:35-04:00, 2010:07:23 11:39:07-04:00, 2010:07:23 11:41:16-04:00, 2010:07:23 11:42:12-04:00, 2010:07:23 11:43:41-04:00, 2010:07:23 11:43:41-04:00, 2010:07:23 11:50:08-04:00, 2010:07:23 12:29:49-04:00, 2010:07:23 17:15:57-04:00, 2010:07:26 13:08:22-04:00, 2010:07:26 13:14:04-04:00, 2010:07:26 17:09:07-04:00, 2010:07:27 13:45:26-04:00, 2010:07:27 17:22:34-04:00, 2010:07:28 11:21:46-04:00, 2010:07:28 13:27:56-04:00, 2010:07:28 13:32:25-04:00, 2010:07:28 14:16:06-04:00, 2010:07:28 14:16:06-04:00, 2010:07:28 14:17:31-04:00, 2010:07:28 14:22:12-04:00, 2010:07:28 14:56:03-04:00, 2010:07:28 15:03:52-04:00, 2010:07:28 17:25:43-04:00, 2010:07:28 17:34:35-04:00, 2010:08:12 16:55:22-04:00, 2010:08:12 16:55:22-04:00, 2010:08:13 16:37:56-04:00, 2010:08:13 16:44:21-04:00, 2010:08:13 16:45:09-04:00, 2010:08:13 16:46:54-04:00, 2010:08:13 16:50:25-04:00, 2010:09:16 15:03:52-04:00, 2010:09:16 15:03:52-04:00, 2010:09:16 15:15:11-04:00, 2010:09:16 15:15:15-04:00, 2010:09:16 15:15:15-04:00, 2010:09:16 15:15:52-04:00, 2010:09:16 15:17:28-04:00, 2010:09:16 15:19:59-04:00, 2010:09:16 15:20:02-04:00, 2010:09:16 15:20:02-04:00, 2010:09:16 15:22:10-04:00, 2010:09:16 15:25:02-04:00, 2010:09:16 15:25:07-04:00, 2010:09:16 15:25:07-04:00, 2010:09:16 15:27:44-04:00, 2010:09:16 15:29:51-04:00, 2010:09:16 15:32:02-04:00, 2010:09:16 15:34:10-04:00, 2010:09:16 15:52:56-04:00, 2010:09:16 15:54:42-04:00, 2010:09:16 15:55:53-04:00, 2010:09:16 15:55:58-04:00, 2010:09:16 15:55:58-04:00, 2010:09:16 15:57:31-04:00, 2010:09:16 16:02:27-04:00, 2010:09:17 07:39:30-04:00, 2010:09:17 08:48:39-04:00, 2010:09:17 08:48:39-04:00, 2010:09:17 12:22:18-04:00, 2010:09:17 12:22:24-04:00, 2010:09:17 12:22:24-04:00, 2010:09:17 12:24:09-04:00, 2010:09:17 12:27:58-04:00, 2010:09:17 12:32:20-04:00, 2010:09:17 12:51:55-04:00, 2010:09:17 13:59:16-04:00, 2010:09:17 14:01:07-04:00, 2010:09:17 14:04:35-04:00, 2010:09:17 14:05:58-04:00, 2010:09:17 14:07:24-04:00, 2010:09:17 14:17:46-04:00, 2010:09:17 14:32:40-04:00, 2010:09:17 14:32:48-04:00, 2010:09:17 14:32:48-04:00, 2010:09:17 14:36:05-04:00, 2010:09:17 14:42:49-04:00, 2010:09:17 15:02:04-04:00, 2010:09:17 15:02:17-04:00, 2010:09:17 15:03:39-04:00, 2010:09:17 15:09:30-04:00, 2010:09:17 15:15:50-04:00, 2010:09:17 15:18:11-04:00, 2010:09:17 15:44:33-04:00, 2010:09:20 13:45:54-04:00, 2010:09:20 13:45:54-04:00, 2010:09:20 13:54:21-04:00, 2010:09:20 14:27:12-04:00, 2010:09:21 12:17:48-04:00, 2010:09:21 12:17:48-04:00, 2010:09:21 12:24:28-04:00, 2010:09:21 13:15:34-04:00, 2010:09:21 13:27:27-04:00, 2010:09:21 14:09:36-04:00, 2010:09:21 14:09:36-04:00, 2010:09:21 17:05:19-04:00, 2010:09:21 17:05:19-04:00, 2010:09:23 09:08:36-04:00, 2010:09:23 09:08:36-04:00, 2010:09:23 09:10:30-04:00, 2010:09:23 11:29:18-04:00, 2010:09:23 11:32:16-04:00, 2010:09:23 11:36:26-04:00, 2010:09:23 11:47:18-04:00, 2010:09:23 12:04:46-04:00, 2010:09:23 12:04:50-04:00, 2010:09:23 12:04:50-04:00, 2010:09:23 15:55:39-04:00, 2010:09:23 16:10:10-04:00, 2010:09:23 16:15:32-04:00, 2010:09:23 16:19:41-04:00, 2010:09:23 16:21:35-04:00, 2010:09:23 16:22-04:00, 2010:09:23 16:24:12-04:00, 2010:09:23 16:29:48-04:00, 2010:09:23 16:29:59-04:00, 2010:09:23 16:31:23-04:00, 2010:09:23 16:33:09-04:00, 2010:09:23 16:37:47-04:00, 2010:09:23 16:59:55-04:00, 2010:09:24 08:17:45-04:00, 2010:09:24 08:34:12-04:00, 2010:09:24 08:44:46-04:00, 2010:09:24 08:47:39-04:00, 2010:09:24 09:02:34-04:00, 2010:09:24 09:03:32-04:00, 2010:09:24 09:08:46-04:00, 2010:09:24 09:10:01-04:00, 2010:09:24 09:10:48-04:00, 2010:09:24 09:10:48-04:00, 2010:09:24 09:12:07-04:00, 2010:09:24 09:57:17-04:00, 2010:09:24 09:57:48-04:00, 2010:09:24 10:00:05-04:00, 2010:09:24 10:00:13-04:00, 2010:09:24 10:32:42-04:00, 2010:09:24 11:13:47-04:00, 2010:09:24 11:18:04-04:00, 2010:09:24 11:18:04-04:00, 2010:09:24 11:19:20-04:00, 2010:09:24 11:19:58-04:00, 2010:09:24 11:26:59-04:00, 2010:09:24 11:29:46-04:00, 2010:09:24 11:29:56-04:00, 2010:09:24 11:30:32-04:00, 2010:09:24 11:35-04:00, 2010:09:24 11:35:28-04:00, 2010:09:24 11:36:38-04:00, 2010:09:24 11:38:35-04:00, 2010:09:24 11:40:54-04:00, 2010:09:24 11:43:20-04:00, 2010:09:24 11:43:22-04:00, 2010:09:24 11:43:37-04:00, 2010:09:24 11:44:49-04:00, 2010:09:24 11:46:48-04:00, 2010:09:24 11:48:39-04:00, 2010:09:24 11:51:33-04:00, 2010:09:24 11:51:39-04:00, 2010:09:24 11:51:39-04:00, 2010:09:24 11:54:47-04:00, 2010:09:24 11:56:51-04:00, 2010:09:24 11:57:59-04:00, 2010:09:24 11:59:56-04:00, 2010:09:24 12:01:29-04:00, 2010:09:24 12:08:48-04:00, 2010:09:24 12:08:52-04:00, 2010:09:24 12:08:52-04:00, 2010:09:24 12:59:11-04:00, 2010:09:24 16:03:02-04:00, 2010:10:04 11:46:24-04:00, 2010:10:04 11:55:22-04:00, 2010:10:04 11:55:35-04:00, 2010:10:04 11:55:35-04:00, 2010:10:04 12:03:49-04:00, 2010:10:04 13:09:58-04:00, 2010:10:04 14:03:36-04:00, 2010:10:04 14:11:27-04:00, 2010:10:04 14:14:18-04:00, 2010:10:04 14:18:30-04:00, 2010:10:04 14:20:53-04:00, 2010:10:04 14:25:11-04:00, 2010:10:04 14:25:16-04:00, 2010:10:04 14:25:16-04:00, 2010:10:04 14:29:11-04:00, 2010:10:04 14:35:09-04:00, 2010:10:04 14:35:54-04:00, 2010:10:04 14:39-04:00, 2010:10:04 14:40:18-04:00, 2010:10:04 14:41:25-04:00, 2010:10:04 14:50:15-04:00, 2010:10:04 14:55:34-04:00, 2010:10:04 14:58:34-04:00, 2010:10:04 14:58:58-04:00, 2010:10:04 15:02:31-04:00, 2010:10:04 15:07:39-04:00, 2010:10:04 15:11:52-04:00, 2010:10:04 15:15:46-04:00, 2010:10:04 15:16:03-04:00, 2010:10:04 15:17:58-04:00, 2010:10:04 15:18:02-04:00, 2010:10:04 15:18:02-04:00, 2010:10:04 15:20:49-04:00, 2010:10:04 15:24:27-04:00, 2010:10:04 15:29:42-04:00, 2010:10:04 15:36:43-04:00, 2010:10:04 15:37:53-04:00, 2010:10:04 15:40:02-04:00, 2010:10:04 15:41:59-04:00, 2010:10:04 15:47:52-04:00, 2010:10:04 15:51:05-04:00, 2010:10:04 16:02:11-04:00, 2010:10:04 16:04:56-04:00, 2010:10:04 16:15:39-04:00, 2010:10:04 16:30:02-04:00, 2010:10:04 16:30:07-04:00, 2010:10:04 16:30:07-04:00, 2010:10:04 16:31:57-04:00, 2010:10:04 16:33:05-04:00, 2010:10:04 16:35:05-04:00, 2010:10:04 16:36:53-04:00, 2010:10:04 16:39:29-04:00, 2010:10:04 16:45:47-04:00, 2010:10:04 16:48:40-04:00, 2010:10:05 09:03:58-04:00, 2010:10:05 09:03:58-04:00, 2010:10:05 09:38:12-04:00, 2010:10:05 09:42:18-04:00, 2010:10:05 13:25:19-04:00, 2010:10:05 13:26:57-04:00, 2010:10:05 13:26:57-04:00, 2010:10:05 13:30:18-04:00, 2010:10:05 13:34:41-04:00, 2010:10:05 14:09:05-04:00, 2010:10:05 14:12:24-04:00, 2010:10:05 14:16:48-04:00, 2010:10:05 14:36:16-04:00, 2010:10:05 14:36:21-04:00, 2010:10:05 14:36:21-04:00, 2010:10:05 14:41:08-04:00, 2010:10:05 14:46:31-04:00, 2010:10:05 15:04:15-04:00, 2010:10:05 15:04:20-04:00, 2010:10:05 15:04:20-04:00, 2010:10:05 15:07:56-04:00, 2010:10:05 15:08:07-04:00, 2010:10:05 15:08:07-04:00, 2010:10:05 15:14:47-04:00, 2010:10:05 15:18:28-04:00, 2010:10:05 15:23:40-04:00, 2010:10:05 15:25:17-04:00, 2010:10:05 15:58:18-04:00, 2010:10:05 16:06:09-04:00, 2010:10:05 16:07:46-04:00, 2010:10:05 16:13:29-04:00, 2010:10:05 16:15:51-04:00, 2010:10:05 16:20:37-04:00, 2010:10:06 15:11:54-04:00, 2010:11:03 11:49:40-04:00, 2010:11:03 12:00:27-04:00, 2011:06:10 15:52:14-04:00, 2011:06:10 15:52:14-04:00, 2011:06:10 15:59:53-04:00, 2011:06:10 17:04:52-04:00, 2011:06:10 17:24:30-04:00, 2012:07:25 15:10:16-04:00, 2012:07:25 15:10:16-04:00, 2012:07:25 15:14:53-04:00, 2012:07:25 15:36:14-04:00, 2012:07:25 15:43:42-04:00, 2012:07:25 15:58:59-04:00, 2012:07:25 16:03:26-04:00, 2012:07:25 16:04:34-04:00, 2012:07:25 16:07:58-04:00, 2012:07:25 16:14:32-04:00, 2012:07:25 16:17:07-04:00, 2012:07:25 16:24:41-04:00, 2012:07:25 16:27:26-04:00, 2012:07:25 16:35:11-04:00, 2012:07:25 16:45:36-04:00, 2012:07:25 16:53:35-04:00, 2012:07:25 16:56:19-04:00, 2012:07:25 17:01:04-04:00, 2012:07:25 17:06:55-04:00, 2012:07:25 17:09:32-04:00, 2012:07:25 17:15:35-04:00, 2012:07:25 17:17:21-04:00, 2012:07:25 17:19:29-04:00, 2012:07:25 17:23:43-04:00, 2012:07:25 17:26:21-04:00, 2012:07:25 17:27:17-04:00, 2012:07:25 17:29:13-04:00, 2012:07:25 17:30:40-04:00, 2012:07:25 17:32:01-04:00, 2012:07:25 17:33:14-04:00, 2012:07:25 17:35:08-04:00, 2012:07:25 17:37-04:00, 2012:07:25 17:37:58-04:00, 2012:07:25 17:45:30-04:00, 2012:07:25 17:49-04:00, 2012:07:25 17:55:02-04:00, 2012:07:25 17:57:13-04:00, 2012:07:25 17:58:39-04:00, 2012:07:25 18:00:31-04:00, 2012:07:26 10:46:28-04:00, 2012:07:26 10:48:05-04:00, 2012:07:26 11:33:28-04:00, 2012:07:26 11:33:28-04:00, 2012:07:26 11:41:41-04:00, 2012:07:26 12:03:43-04:00, 2012:07:26 12:07:45-04:00, 2012:07:26 12:27:41-04:00, 2012:07:26 15:05:12-04:00, 2012:07:26 15:06:46-04:00, 2012:07:26 15:08:47-04:00, 2012:07:26 15:25:18-04:00, 2012:07:26 17:52:02-04:00, 2012:07:26 17:52:03-04:00, 2012:08:13 13:22:38-04:00, 2012:08:13 13:22:39-04:00, 2012:08:13 14:21:34-04:00, 2012:08:13 14:22:45-04:00, 2012:08:13 14:49:26-04:00, 2012:08:14 10:52:05-04:00, 2012:08:14 10:52:06-04:00, 2012:08:14 10:57:57-04:00, 2012:08:14 10:58:31-04:00, 2012:08:14 11:04:15-04:00, 2012:08:14 11:09:09-04:00, 2012:08:14 11:29:14-04:00, 2012:08:14 11:31:04-04:00, 2012:08:14 11:57:48-04:00, 2012:08:14 15:18:25-04:00, 2012:08:14 15:18:25-04:00, 2012:08:14 15:21:02-04:00, 2012:08:14 15:59:34-04:00, 2012:08:14 16:18-04:00, 2012:08:14 16:23:49-04:00, 2012:08:14 16:41:44-04:00, 2012:08:14 16:44:22-04:00, 2012:08:15 11:34-04:00, 2012:08:15 11:36:41-04:00, 2012:08:15 12:17-04:00, 2012:08:15 12:18-04:00, 2012:08:15 12:24:23-04:00, 2012:08:15 12:25:47-04:00, 2012:08:15 12:26:14-04:00, 2012:08:15 12:28:09-04:00, 2012:08:15 12:28:55-04:00, 2012:08:15 12:29:45-04:00, 2012:08:15 12:41:59-04:00, 2012:08:15 12:42:07-04:00, 2012:08:15 12:42:07-04:00, 2012:08:15 12:43:32-04:00, 2012:08:15 12:56:19-04:00, 2012:08:15 12:56:43-04:00, 2012:08:15 13:04:18-04:00, 2012:08:15 13:05:26-04:00, 2012:08:15 13:07:16-04:00, 2012:08:15 13:10:33-04:00, 2012:08:15 13:10:57-04:00, 2012:08:15 13:15:04-04:00, 2012:08:15 13:40:45-04:00, 2012:08:15 13:45:42-04:00, 2012:08:15 14:39:09-04:00, 2012:08:15 14:39:44-04:00, 2012:08:15 14:58:39-04:00, 2012:08:15 15:08:21-04:00, 2012:08:15 15:10:41-04:00, 2012:08:15 15:11:35-04:00, 2012:08:15 15:15:53-04:00, 2012:08:15 15:16:40-04:00, 2012:08:15 15:29:22-04:00, 2012:08:15 15:33:58-04:00, 2012:08:15 15:41:49-04:00, 2012:08:15 15:43:44-04:00, 2012:08:15 15:44:20-04:00, 2012:08:15 15:48:02-04:00, 2012:08:15 15:56:54-04:00, 2012:08:15 15:58:11-04:00, 2012:08:15 15:58:53-04:00, 2012:08:15 16:01:17-04:00, 2012:08:15 16:06:05-04:00, 2012:08:15 16:09:05-04:00, 2012:08:15 16:12:01-04:00, 2012:08:15 16:49:53-04:00, 2012:08:15 17:03:52-04:00, 2012:08:15 17:05:32-04:00, 2012:08:15 17:20:20-04:00, 2012:08:15 17:21:30-04:00, 2012:08:15 17:22:58-04:00, 2012:08:15 17:27:20-04:00, 2012:08:15 17:30:13-04:00, 2012:08:16 11:42:39-04:00, 2012:08:16 11:49:48-04:00, 2012:08:16 12:42:27-04:00, 2012:08:16 12:48:59-04:00, 2012:08:16 13:00:45-04:00, 2012:08:16 13:19:50-04:00, 2012:08:16 13:31:51-04:00, 2012:08:16 13:43:25-04:00, 2012:08:16 14:00:30-04:00, 2012:08:16 14:11:43-04:00, 2012:08:16 14:14:05-04:00, 2012:08:16 14:20:12-04:00, 2012:08:16 14:22:01-04:00, 2012:08:16 14:24:24-04:00, 2012:08:16 14:28:35-04:00, 2012:08:16 14:32:50-04:00, 2012:08:16 16:13:02-04:00, 2012:08:16 16:15:54-04:00, 2012:08:17 11:13:07-04:00, 2012:08:17 11:13:07-04:00, 2012:09:06 14:20:54-04:00, 2012:09:06 14:20:54-04:00, 2012:09:06 14:23:17-04:00, 2012:09:06 14:25:59-04:00, 2012:09:06 14:28:49-04:00, 2012:09:06 14:28:58-04:00, 2012:09:06 14:37:51-04:00, 2012:09:06 14:42:39-04:00, 2012:09:06 16:37:48-04:00, 2012:09:06 16:45:32-04:00, 2012:09:06 17:40:43-04:00, 2012:11:05 11:24:15-05:00, 2012:11:05 11:24:15-05:00, 2012:11:05 11:36:32-05:00, 2012:11:05 12:30:43-05:00, 2012:11:05 12:34:23-05:00, 2012:11:30 10:47:56-05:00, 2012:11:30 10:47:56-05:00, 2012:11:30 11:04:48-05:00, 2013:01:08 12:20:51-05:00, 2013:01:08 12:20:51-05:00, 2013:01:08 12:35:39-05:00, 2013:01:08 12:43:10-05:00, 2013:01:08 12:57:34-05:00, 2013:01:08 13:26:04-05:00, 2013:01:08 13:31:34-05:00, 2013:01:08 13:44:15-05:00, 2013:01:08 13:47:18-05:00, 2013:01:08 13:49:05-05:00, 2013:01:08 13:57:48-05:00, 2013:01:08 14:02:34-05:00, 2013:01:08 14:03:31-05:00, 2013:01:08 14:07:44-05:00, 2013:01:08 14:11:38-05:00, 2013:01:08 14:12:37-05:00, 2013:01:08 14:13:46-05:00, 2013:01:08 14:16:23-05:00, 2013:01:08 14:16:39-05:00, 2013:01:08 14:17:08-05:00, 2013:01:08 14:19:02-05:00, 2013:01:08 14:23:39-05:00, 2013:01:08 14:24:49-05:00, 2013:01:08 14:35:13-05:00, 2013:01:08 14:37:13-05:00, 2013:01:08 14:49-05:00, 2013:01:08 15:43:31-05:00, 2013:01:08 15:47:03-05:00, 2013:01:08 15:49:06-05:00, 2013:01:08 15:51:05-05:00, 2013:01:08 16:02:41-05:00, 2013:01:08 16:09:25-05:00, 2013:01:08 16:13:53-05:00, 2013:01:08 16:18:19-05:00, 2013:01:08 16:18:39-05:00, 2013:01:08 16:20:37-05:00, 2013:01:08 16:25:05-05:00, 2013:01:08 16:25:54-05:00, 2013:01:08 16:30:30-05:00, 2013:01:08 16:31:57-05:00, 2013:01:08 16:37:14-05:00, 2013:01:08 16:38:46-05:00, 2013:01:08 16:40:58-05:00, 2013:01:08 16:41:33-05:00, 2013:01:08 17:27:21-05:00, 2013:01:09 09:31:49-05:00, 2013:01:09 09:31:49-05:00, 2013:01:09 10:51:05-05:00, 2013:01:09 10:53:33-05:00, 2013:01:09 10:54:34-05:00, 2013:01:09 12:32:10-05:00, 2013:01:09 12:32:40-05:00, 2013:01:09 12:33:20-05:00, 2013:01:09 12:33:40-05:00, 2013:01:09 15:04:44-05:00, 2013:01:09 15:07:52-05:00, 2013:01:09 15:09:29-05:00, 2013:01:09 15:18:09-05:00, 2013:01:09 15:22:20-05:00, 2013:01:09 15:23:56-05:00, 2013:01:09 15:25:06-05:00, 2013:01:09 15:28:09-05:00, 2013:01:09 15:28:36-05:00, 2013:01:09 15:33:59-05:00, 2013:01:09 15:39:04-05:00, 2013:01:09 15:46:11-05:00, 2013:01:09 15:46:46-05:00, 2013:01:09 15:47:48-05:00, 2013:01:10 11:38:53-05:00, 2013:01:10 11:39:19-05:00, 2013:01:10 11:42:21-05:00, 2013:01:10 11:45:17-05:00, 2013:01:10 11:54:58-05:00, 2013:01:10 12:24:05-05:00, 2013:01:10 12:27:17-05:00, 2013:01:10 12:29:30-05:00, 2013:01:10 12:30:46-05:00, 2013:01:10 12:36:04-05:00, 2013:01:10 12:38:23-05:00, 2013:01:10 12:44:30-05:00, 2013:01:10 12:49:18-05:00, 2013:01:10 12:54:21-05:00, 2013:01:10 12:54:27-05:00, 2013:01:10 12:55:05-05:00, 2013:01:10 12:56:33-05:00, 2013:01:10 16:21:47-05:00, 2013:01:10 16:21:47-05:00, 2013:01:10 16:29:56-05:00, 2013:01:10 16:29:56-05:00, 2013:01:10 16:32:25-05:00, 2013:01:10 16:34:29-05:00, 2013:01:10 16:38:45-05:00, 2013:01:10 16:42:10-05:00, 2013:01:10 16:44:45-05:00, 2013:01:10 16:45:34-05:00, 2013:01:10 16:46:26-05:00, 2013:01:10 16:49:19-05:00, 2013:01:10 16:56:20-05:00, 2013:01:10 16:57:30-05:00, 2013:01:10 17:05-05:00, 2013:01:10 17:07:23-05:00, 2013:01:10 17:10:14-05:00, 2013:01:10 17:12:04-05:00, 2013:01:10 17:13:56-05:00, 2013:01:10 17:16:11-05:00, 2013:01:10 17:26:35-05:00, 2013:01:10 17:28:43-05:00, 2013:01:10 17:32:11-05:00, 2013:01:10 17:36:28-05:00, 2013:01:10 17:37:24-05:00, 2013:01:11 10:13:57-05:00, 2013:01:11 10:13:57-05:00, 2013:01:11 10:23:06-05:00, 2013:01:11 10:26:05-05:00, 2013:01:11 11:29:12-05:00, 2013:01:11 11:30:21-05:00, 2013:01:11 11:41:16-05:00, 2013:01:11 11:42:25-05:00, 2013:01:11 11:43:39-05:00, 2013:01:11 11:45:22-05:00, 2013:01:11 12:39:26-05:00, 2013:01:11 12:39:26-05:00, 2013:01:11 12:43:25-05:00, 2013:01:11 12:43:25-05:00, 2013:01:11 13:26:16-05:00, 2013:01:11 13:26:16-05:00, 2013:01:11 18:04:22-05:00, 2013:01:14 11:31:53-05:00, 2013:01:14 12:07:07-05:00, 2013:01:14 15:33:52-05:00, 2013:01:14 15:34:44-05:00, 2013:01:14 15:53:11-05:00, 2013:01:14 15:55:04-05:00, 2013:01:14 15:58:50-05:00, 2013:01:14 16:04:45-05:00, 2013:01:14 16:11-05:00, 2013:01:14 16:11:42-05:00, 2013:01:14 16:22:52-05:00, 2013:01:14 17:13:23-05:00, 2013:01:14 17:14:04-05:00, 2013:01:14 17:15:23-05:00, 2013:01:14 17:16:19-05:00, 2013:01:14 17:24:21-05:00, 2013:01:14 17:25:53-05:00, 2013:01:14 17:41:42-05:00, 2013:01:15 10:45:38-05:00, 2013:01:15 10:45:38-05:00, 2013:01:15 10:59:09-05:00, 2013:01:15 10:59:57-05:00, 2013:01:15 11:06:59-05:00, 2013:01:15 11:08:54-05:00, 2013:01:15 11:09:46-05:00, 2013:01:15 11:12:33-05:00, 2013:01:15 11:13:14-05:00, 2013:01:15 11:14:51-05:00, 2013:01:15 11:16:20-05:00, 2013:01:15 11:17:34-05:00, 2013:01:15 11:19:20-05:00, 2013:01:15 11:19:47-05:00, 2013:01:15 11:21:26-05:00, 2013:01:15 11:22:11-05:00, 2013:01:15 11:22:52-05:00, 2013:01:15 11:23-05:00, 2013:01:15 11:24:13-05:00, 2013:01:15 11:26:22-05:00, 2013:01:15 11:55:03-05:00, 2013:01:15 11:56:56-05:00, 2013:01:15 11:57:05-05:00, 2013:01:15 11:57:05-05:00, 2013:01:15 12:06:19-05:00, 2013:01:15 12:06:19-05:00, 2013:01:15 13:49:35-05:00, 2013:01:15 13:59:31-05:00, 2013:01:15 14:17:25-05:00, 2013:01:15 14:22:47-05:00, 2013:01:15 14:24:19-05:00, 2013:01:15 14:33:41-05:00, 2013:01:15 15:24:57-05:00, 2013:01:15 15:41:54-05:00, 2013:01:15 15:45:05-05:00, 2013:01:15 15:53:55-05:00, 2013:01:15 15:55:30-05:00, 2013:01:15 17:18:44-05:00, 2013:01:15 17:32:38-05:00, 2013:01:16 12:18:36-05:00, 2013:01:16 12:23:15-05:00, 2013:01:16 12:24:58-05:00, 2013:01:16 12:26:49-05:00, 2013:01:16 15:30:03-05:00, 2013:01:16 15:42:41-05:00, 2013:01:16 15:48:55-05:00, 2013:01:16 15:50:57-05:00, 2013:01:17 11:06:22-05:00, 2013:01:17 11:06:22-05:00, 2013:01:17 16:58:23-05:00, 2013:01:17 16:59:37-05:00, 2013:01:17 17:46:17-05:00, 2013:01:24 13:34:21-05:00, 2013:01:24 13:34:21-05:00, 2013:01:24 15:13:06-05:00, 2013:01:24 15:14:26-05:00, 2013:01:24 15:23:35-05:00, 2013:01:24 15:28:25-05:00, 2013:01:24 15:32:31-05:00, 2013:01:24 15:37:47-05:00, 2013:01:24 16:25:07-05:00, 2013:01:24 16:25:58-05:00, 2013:01:24 16:29:39-05:00, 2013:03:14 14:50:42-04:00, 2013:03:14 14:50:42-04:00, 2013:03:14 14:58:22-04:00, 2013:03:14 15:16:07-04:00, 2013:03:14 15:22:12-04:00, 2013:03:14 15:24:36-04:00, 2013:03:14 15:35:37-04:00, 2013:03:14 15:41:16-04:00, 2013:03:14 15:54:33-04:00, 2013:03:14 15:56:29-04:00, 2013:03:14 15:58:05-04:00, 2013:03:14 16:13:49-04:00, 2013:03:15 10:15:12-04:00, 2013:03:15 10:22:56-04:00, 2013:03:15 10:38:24-04:00, 2013:03:15 10:44:59-04:00, 2013:03:15 10:54:18-04:00, 2013:03:15 11:02:02-04:00, 2013:03:15 12:33:02-04:00, 2013:03:15 12:37:16-04:00, 2013:03:15 12:39:23-04:00, 2013:03:15 12:45:17-04:00, 2013:03:15 12:45:29-04:00, 2013:03:15 12:46:56-04:00, 2013:03:15 12:49:04-04:00, 2013:03:15 12:50:35-04:00, 2013:03:15 12:51:18-04:00, 2013:03:15 12:54:42-04:00, 2013:03:15 12:55:54-04:00, 2013:03:15 12:56:57-04:00, 2013:03:15 12:56:57-04:00, 2013:03:15 12:57:22-04:00, 2013:03:15 13:18:13-04:00, 2013:03:15 14:33:42-04:00, 2013:03:15 14:43:36-04:00, 2013:03:15 14:44:07-04:00, 2013:03:15 15:03:44-04:00, 2013:03:15 15:05:08-04:00, 2013:03:15 15:05:08-04:00, 2013:03:15 15:08:02-04:00, 2013:03:15 15:16:42-04:00, 2013:03:15 15:45:07-04:00, 2013:03:15 15:46:18-04:00, 2013:03:15 15:52:10-04:00, 2013:03:15 15:55:01-04:00, 2013:03:15 16:00:07-04:00, 2013:03:15 16:02:46-04:00, 2013:03:15 16:04:12-04:00, 2013:03:15 16:05:04-04:00, 2013:03:15 16:06:33-04:00, 2013:03:15 16:07:24-04:00, 2013:03:15 16:08:15-04:00, 2013:03:15 16:13:26-04:00, 2013:03:15 16:27:37-04:00, 2013:03:15 16:32:11-04:00, 2013:03:15 16:35:44-04:00, 2013:03:15 16:36:43-04:00, 2013:03:15 17:09:31-04:00, 2013:03:15 17:10:20-04:00, 2013:03:15 17:12:04-04:00, 2013:03:15 17:14:34-04:00, 2013:03:19 15:11:15-04:00, 2013:03:19 15:11:15-04:00, 2013:03:19 15:20:09-04:00, 2013:03:19 15:38:04-04:00, 2013:03:19 15:38:43-04:00, 2013:03:19 16:07:14-04:00, 2013:03:19 16:12:01-04:00, 2013:03:19 16:28:25-04:00, 2013:03:19 17:27:37-04:00, 2013:03:22 13:03:25-04:00, 2013:03:22 13:17:04-04:00, 2013:03:22 13:18:33-04:00, 2013:03:22 13:41:45-04:00, 2013:03:22 13:42:26-04:00, 2013:03:22 13:42:26-04:00, 2013:03:22 13:44:47-04:00, 2013:03:22 13:46:35-04:00, 2013:03:22 14:49:03-04:00, 2013:03:22 14:53:31-04:00, 2013:03:22 14:56:53-04:00, 2013:03:22 14:58:21-04:00, 2013:03:22 15:12:55-04:00, 2013:03:22 15:14:16-04:00, 2013:03:22 15:17:31-04:00, 2013:03:22 15:21:55-04:00, 2013:03:22 15:23:05-04:00, 2013:03:22 15:23:05-04:00, 2013:03:22 15:59:21-04:00, 2013:03:22 16:00:14-04:00, 2013:03:22 16:14:58-04:00, 2013:03:22 16:26:29-04:00, 2013:03:22 16:32:12-04:00, 2013:03:22 16:50:31-04:00, 2013:03:22 16:53:16-04:00, 2013:03:22 16:57:23-04:00, 2013:03:22 16:57:54-04:00, 2013:03:22 16:58:42-04:00, 2013:03:22 17:09:35-04:00, 2013:03:22 17:10:13-04:00, 2013:03:25 13:04:29-04:00, 2013:03:25 13:06:09-04:00, 2013:03:25 13:06:44-04:00, 2013:03:25 13:18:54-04:00, 2013:03:25 15:46:59-04:00, 2013:03:25 15:58:14-04:00, 2013:03:25 16:33:11-04:00, 2013:03:25 17:13:45-04:00, 2013:03:26 13:42:55-04:00, 2013:03:26 13:44:39-04:00, 2013:03:26 13:45:55-04:00, 2013:03:26 13:46:18-04:00, 2013:03:26 13:50:16-04:00, 2013:03:26 13:50:16-04:00, 2013:03:27 13:08:59-04:00, 2013:03:27 13:08:59-04:00, 2013:03:27 13:10:27-04:00, 2013:03:27 14:02:18-04:00, 2013:03:27 14:03:59-04:00, 2013:03:27 14:14:27-04:00, 2013:03:27 15:16:56-04:00, 2013:03:27 15:47:46-04:00, 2013:03:27 16:09:13-04:00, 2013:03:27 16:15:26-04:00, 2013:03:27 16:21:11-04:00, 2013:03:27 16:21:57-04:00, 2013:03:27 16:27:19-04:00, 2013:03:27 16:28:50-04:00, 2013:03:27 16:30:55-04:00, 2013:03:27 16:32:01-04:00, 2013:03:27 16:34:16-04:00, 2013:03:27 16:36:32-04:00, 2013:03:27 16:57:43-04:00, 2013:03:27 16:58:11-04:00, 2013:03:27 16:59:45-04:00, 2013:03:28 09:58:29-04:00, 2013:03:28 10:01:21-04:00, 2013:03:28 10:01:21-04:00, 2013:03:28 12:03:39-04:00, 2013:03:28 12:11:32-04:00, 2013:03:28 12:13:21-04:00, 2013:03:28 12:44:15-04:00, 2013:03:28 12:45:53-04:00, 2013:03:28 12:46:33-04:00, 2013:03:28 12:49:51-04:00, 2013:03:28 12:57:43-04:00, 2013:03:28 13:25:23-04:00, 2013:03:28 13:31:10-04:00, 2013:03:28 13:31:10-04:00, 2013:03:28 13:54:02-04:00, 2013:03:28 13:55:16-04:00, 2013:03:28 13:58:48-04:00, 2013:03:28 14:10:29-04:00, 2013:03:28 14:16:21-04:00, 2013:03:28 14:19:26-04:00, 2013:03:28 14:23:02-04:00, 2013:03:28 14:23:31-04:00, 2013:03:28 14:30:31-04:00, 2013:03:28 14:42:15-04:00, 2013:03:28 14:48:15-04:00, 2013:03:28 14:49:05-04:00, 2013:03:28 14:54:36-04:00, 2013:03:28 15:00:12-04:00, 2013:03:28 15:09:29-04:00, 2013:03:28 15:11:04-04:00, 2013:03:28 15:21:39-04:00, 2013:03:28 15:23:04-04:00, 2013:03:28 15:28:37-04:00, 2013:03:28 15:31:09-04:00, 2013:03:28 15:31:09-04:00, 2013:03:28 15:31:38-04:00, 2013:03:28 15:34:37-04:00, 2013:03:28 15:36:29-04:00, 2013:03:28 15:39:47-04:00, 2013:03:28 15:40:21-04:00, 2013:03:28 15:46:37-04:00, 2013:03:28 15:47:12-04:00, 2013:03:28 15:57:01-04:00, 2013:03:28 16:08:11-04:00, 2013:03:28 16:08:52-04:00, 2013:03:28 16:36:59-04:00, 2013:03:28 17:18:14-04:00, 2013:03:28 17:31:40-04:00, 2013:03:29 12:27:01-04:00, 2013:03:29 13:01:28-04:00, 2013:03:29 14:17:40-04:00, 2013:03:29 14:23:25-04:00, 2013:03:29 14:32:29-04:00, 2013:03:29 14:55:38-04:00, 2013:03:29 15:05:13-04:00, 2013:03:29 15:22:33-04:00, 2013:03:29 15:23:22-04:00, 2013:03:29 15:24:42-04:00, 2013:03:29 15:33:56-04:00, 2013:03:29 15:40:44-04:00, 2013:03:29 15:44:50-04:00, 2013:03:29 15:51:12-04:00, 2013:03:29 15:56:24-04:00, 2013:03:29 15:57:22-04:00, 2013:03:29 16:01:04-04:00, 2013:03:29 16:06:32-04:00, 2013:03:29 16:14:06-04:00, 2013:03:29 16:21:41-04:00, 2013:04:01 10:36:23-04:00, 2013:04:01 11:17:02-04:00, 2013:04:01 13:11:52-04:00, 2013:04:01 14:02:56-04:00, 2013:04:01 14:07:47-04:00, 2013:04:01 14:13:13-04:00, 2013:04:01 14:15:14-04:00, 2013:04:01 14:16:59-04:00, 2013:04:01 14:17:59-04:00, 2013:04:01 14:20:33-04:00, 2013:04:01 14:24:34-04:00, 2013:04:01 14:33:40-04:00, 2013:04:01 14:34:05-04:00, 2013:04:01 14:43:08-04:00, 2013:04:01 14:43:45-04:00, 2013:04:01 14:46:09-04:00, 2013:04:01 14:49:57-04:00, 2013:04:01 14:52:13-04:00, 2013:04:01 14:53:05-04:00, 2013:04:01 14:53:55-04:00, 2013:04:01 14:53:55-04:00, 2013:04:01 15:06:07-04:00, 2013:04:01 15:10:13-04:00, 2013:04:01 15:13:12-04:00, 2013:04:01 15:13:20-04:00, 2013:04:01 15:13:52-04:00, 2013:04:01 15:16:08-04:00, 2013:04:01 15:23:47-04:00, 2013:04:01 16:01:33-04:00, 2013:04:01 16:04:28-04:00, 2013:04:01 16:06:47-04:00, 2013:04:01 16:09:46-04:00, 2013:04:01 16:13:59-04:00, 2013:04:01 16:14:47-04:00, 2013:04:01 16:17:01-04:00, 2013:04:01 16:49:47-04:00, 2013:04:01 17:00:59-04:00, 2013:04:01 17:02:59-04:00, 2013:04:01 17:05:09-04:00, 2013:04:01 17:07:09-04:00, 2013:04:01 17:08:53-04:00, 2013:04:01 17:08:53-04:00, 2013:04:01 17:20:40-04:00, 2013:04:01 17:23:48-04:00, 2013:04:01 17:27:58-04:00, 2013:04:01 17:33:24-04:00, 2013:04:01 17:34:39-04:00, 2013:04:01 17:40:32-04:00, 2013:04:01 17:55:59-04:00, 2013:04:01 17:55:59-04:00, 2013:04:01 17:57:46-04:00, 2013:04:01 18:04:44-04:00, 2013:04:02 10:48:13-04:00, 2013:04:02 10:58:54-04:00, 2013:04:02 11:02:07-04:00, 2013:04:02 12:27:29-04:00, 2013:04:02 12:33:10-04:00, 2013:04:02 12:33:34-04:00, 2013:04:02 12:40:54-04:00, 2013:04:02 12:51:14-04:00, 2013:04:02 12:51:21-04:00, 2013:04:02 12:51:21-04:00, 2013:04:02 13:16:38-04:00, 2013:04:02 13:20:38-04:00, 2013:04:02 13:29:42-04:00, 2013:04:02 13:31:14-04:00, 2013:04:02 13:32:17-04:00, 2013:04:02 13:32:34-04:00, 2013:04:02 13:36:01-04:00, 2013:04:02 13:38:34-04:00, 2013:04:02 13:53:32-04:00, 2013:04:02 14:04:57-04:00, 2013:04:02 14:11:30-04:00, 2013:04:02 14:47:41-04:00, 2013:04:02 15:37:36-04:00, 2013:04:02 15:43:29-04:00, 2013:04:02 15:46:58-04:00, 2013:04:02 15:52:07-04:00, 2013:04:03 15:23:45-04:00, 2013:04:03 16:09:56-04:00, 2013:04:03 16:11:34-04:00, 2013:04:03 16:56:33-04:00, 2013:04:03 16:58:56-04:00, 2013:04:05 12:02:23-04:00, 2013:04:05 12:14:13-04:00, 2013:04:05 15:48:20-04:00, 2013:04:08 11:59:19-04:00, 2013:04:08 11:59:19-04:00, 2013:04:08 12:06:54-04:00, 2013:04:08 12:16:34-04:00, 2013:04:08 12:19:05-04:00, 2013:04:08 12:24:56-04:00, 2013:04:08 12:31:03-04:00, 2013:04:08 12:31:41-04:00, 2013:04:08 12:33:51-04:00, 2013:04:08 12:43:40-04:00, 2013:04:08 12:45:45-04:00, 2013:04:08 12:49-04:00, 2013:04:08 12:52:13-04:00, 2013:04:08 12:53:45-04:00, 2013:04:08 12:55:43-04:00, 2013:04:08 12:56:21-04:00, 2013:04:08 12:57:25-04:00, 2013:04:08 13:00:21-04:00, 2013:04:08 13:02:22-04:00, 2013:04:08 13:04:25-04:00, 2013:04:08 13:14:48-04:00, 2013:04:08 14:09:09-04:00, 2013:04:08 14:09:33-04:00, 2013:04:08 14:11:45-04:00, 2013:04:08 14:13:08-04:00, 2013:04:08 14:27:05-04:00, 2013:04:08 14:32:15-04:00, 2013:04:08 14:34:43-04:00, 2013:04:08 15:23:17-04:00, 2013:04:08 16:53:42-04:00, 2013:04:08 17:46:33-04:00, 2013:04:09 15:11:25-04:00, 2013:04:09 15:15-04:00 History Software Agent : Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0, Adobe InDesign 7.0 History Changed : /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /metadata, /, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /metadata, /, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata, /;/metadata Warning : [Minor] Extracted only 1000 xmpMM:History items. Ignore minor errors to extract all Create Date : 2013:04:19 17:27:59-04:00 Modify Date : 2013:04:19 17:28:22-04:00 Metadata Date : 2013:04:19 17:28:22-04:00 Creator Tool : Adobe InDesign CS5 (7.0.3) Page Image Page Number : 1, 2 Page Image Format : JPEG, JPEG Page Image Width : 256, 256 Page Image Height : 256, 256 Page Image : (Binary data 6926 bytes, use -b option to extract), (Binary data 2817 bytes, use -b option to extract) Doc Change Count : 36678 Format : application/pdf Producer : Adobe PDF Library 9.9 Trapped : False Page Count : 509 Creator : Adobe InDesign CS5 (7.0.3)EXIF Metadata provided by EXIF.tools